Feb 9 19:52:29.113890 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:52:29.113941 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:52:29.113961 kernel: BIOS-provided physical RAM map: Feb 9 19:52:29.114047 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 9 19:52:29.114066 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 9 19:52:29.114104 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 9 19:52:29.114127 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 9 19:52:29.114143 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 9 19:52:29.114157 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 9 19:52:29.114171 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 9 19:52:29.114186 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 9 19:52:29.114201 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 9 19:52:29.114215 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 9 19:52:29.114231 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 9 19:52:29.114254 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 9 19:52:29.114270 kernel: NX (Execute Disable) protection: active Feb 9 19:52:29.114286 kernel: efi: EFI v2.70 by EDK II Feb 9 19:52:29.114302 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 9 19:52:29.114318 kernel: random: crng init done Feb 9 19:52:29.114334 kernel: SMBIOS 2.4 present. Feb 9 19:52:29.114349 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 9 19:52:29.114373 kernel: Hypervisor detected: KVM Feb 9 19:52:29.114394 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:52:29.114410 kernel: kvm-clock: cpu 0, msr 65faa001, primary cpu clock Feb 9 19:52:29.114426 kernel: kvm-clock: using sched offset of 12943444851 cycles Feb 9 19:52:29.114444 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:52:29.114460 kernel: tsc: Detected 2299.998 MHz processor Feb 9 19:52:29.114476 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:52:29.114493 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:52:29.114509 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 9 19:52:29.114525 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:52:29.114541 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 9 19:52:29.114563 kernel: Using GB pages for direct mapping Feb 9 19:52:29.114578 kernel: Secure boot disabled Feb 9 19:52:29.114594 kernel: ACPI: Early table checksum verification disabled Feb 9 19:52:29.114611 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 9 19:52:29.114627 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 9 19:52:29.114643 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 9 19:52:29.114659 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 9 19:52:29.114675 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 9 19:52:29.114704 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 9 19:52:29.114721 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 9 19:52:29.114738 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 9 19:52:29.114754 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 9 19:52:29.114772 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 9 19:52:29.114789 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 9 19:52:29.114812 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 9 19:52:29.114830 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 9 19:52:29.114847 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 9 19:52:29.114863 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 9 19:52:29.114880 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 9 19:52:29.114895 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 9 19:52:29.114912 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 9 19:52:29.114929 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 9 19:52:29.114944 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 9 19:52:29.114967 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:52:29.114984 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:52:29.115001 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:52:29.115018 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 9 19:52:29.115036 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 9 19:52:29.115054 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 9 19:52:29.115096 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 9 19:52:29.115122 kernel: NODE_DATA(0) allocated [mem 0x21fff8000-0x21fffdfff] Feb 9 19:52:29.115146 kernel: Zone ranges: Feb 9 19:52:29.115168 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:52:29.115186 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:52:29.115204 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:52:29.115222 kernel: Movable zone start for each node Feb 9 19:52:29.115241 kernel: Early memory node ranges Feb 9 19:52:29.115259 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 9 19:52:29.115278 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 9 19:52:29.115297 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 9 19:52:29.115315 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 9 19:52:29.115339 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:52:29.115369 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 9 19:52:29.115388 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:52:29.115406 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 9 19:52:29.115424 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 9 19:52:29.115443 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 9 19:52:29.115461 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 9 19:52:29.115480 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:52:29.115498 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:52:29.115519 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:52:29.115536 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:52:29.115553 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:52:29.115570 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:52:29.115586 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:52:29.115602 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:52:29.115618 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:52:29.115635 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 9 19:52:29.115651 kernel: Booting paravirtualized kernel on KVM Feb 9 19:52:29.115672 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:52:29.115689 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:52:29.115706 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:52:29.115723 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:52:29.115739 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:52:29.115755 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:52:29.115771 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:52:29.115788 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 9 19:52:29.115804 kernel: Policy zone: Normal Feb 9 19:52:29.115827 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:52:29.115845 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:52:29.115861 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:52:29.115878 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:52:29.115895 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:52:29.115912 kernel: Memory: 7536508K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323816K reserved, 0K cma-reserved) Feb 9 19:52:29.115930 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:52:29.115947 kernel: Kernel/User page tables isolation: enabled Feb 9 19:52:29.115969 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:52:29.115986 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:52:29.116004 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:52:29.116022 kernel: rcu: RCU event tracing is enabled. Feb 9 19:52:29.116040 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:52:29.116058 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:52:29.118445 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:52:29.118473 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:52:29.118491 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:52:29.118513 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:52:29.118543 kernel: Console: colour dummy device 80x25 Feb 9 19:52:29.118560 kernel: printk: console [ttyS0] enabled Feb 9 19:52:29.118580 kernel: ACPI: Core revision 20210730 Feb 9 19:52:29.118596 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:52:29.118753 kernel: x2apic enabled Feb 9 19:52:29.118771 kernel: Switched APIC routing to physical x2apic. Feb 9 19:52:29.118788 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 9 19:52:29.118805 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:52:29.118956 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 9 19:52:29.118982 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 9 19:52:29.118999 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 9 19:52:29.119014 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:52:29.119187 kernel: Spectre V2 : Mitigation: IBRS Feb 9 19:52:29.119206 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:52:29.119222 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:52:29.119336 kernel: RETBleed: Mitigation: IBRS Feb 9 19:52:29.119357 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:52:29.119375 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 9 19:52:29.119393 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:52:29.119411 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 19:52:29.119437 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:52:29.119455 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:52:29.119473 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:52:29.119491 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:52:29.119514 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:52:29.119533 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:52:29.119574 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:52:29.119590 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:52:29.119608 kernel: LSM: Security Framework initializing Feb 9 19:52:29.119623 kernel: SELinux: Initializing. Feb 9 19:52:29.119639 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:52:29.119656 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:52:29.119672 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 9 19:52:29.119693 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 19:52:29.119709 kernel: signal: max sigframe size: 1776 Feb 9 19:52:29.119724 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:52:29.119740 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:52:29.119757 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:52:29.119775 kernel: x86: Booting SMP configuration: Feb 9 19:52:29.119792 kernel: .... node #0, CPUs: #1 Feb 9 19:52:29.119810 kernel: kvm-clock: cpu 1, msr 65faa041, secondary cpu clock Feb 9 19:52:29.119827 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:52:29.119850 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:52:29.119868 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:52:29.119885 kernel: smpboot: Max logical packages: 1 Feb 9 19:52:29.119903 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 9 19:52:29.119919 kernel: devtmpfs: initialized Feb 9 19:52:29.119934 kernel: x86/mm: Memory block size: 128MB Feb 9 19:52:29.119952 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 9 19:52:29.119969 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:52:29.119986 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:52:29.120009 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:52:29.120026 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:52:29.120044 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:52:29.120062 kernel: audit: type=2000 audit(1707508347.695:1): state=initialized audit_enabled=0 res=1 Feb 9 19:52:29.120104 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:52:29.120122 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:52:29.120140 kernel: cpuidle: using governor menu Feb 9 19:52:29.120156 kernel: ACPI: bus type PCI registered Feb 9 19:52:29.120174 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:52:29.120197 kernel: dca service started, version 1.12.1 Feb 9 19:52:29.120214 kernel: PCI: Using configuration type 1 for base access Feb 9 19:52:29.120233 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:52:29.120250 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:52:29.120268 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:52:29.120285 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:52:29.120302 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:52:29.120320 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:52:29.120338 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:52:29.120359 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:52:29.120378 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:52:29.120396 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:52:29.120413 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:52:29.120439 kernel: ACPI: Interpreter enabled Feb 9 19:52:29.120458 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:52:29.120476 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:52:29.120493 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:52:29.120511 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:52:29.120533 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:52:29.120766 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:52:29.120930 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:52:29.120954 kernel: PCI host bridge to bus 0000:00 Feb 9 19:52:29.121145 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:52:29.121289 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:52:29.121439 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:52:29.121574 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 9 19:52:29.121710 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:52:29.121885 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:52:29.122059 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 9 19:52:29.127013 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:52:29.127498 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:52:29.127792 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 9 19:52:29.127962 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 9 19:52:29.128223 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 9 19:52:29.128399 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:52:29.128565 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 9 19:52:29.128718 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 9 19:52:29.128885 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:52:29.129047 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:52:29.129227 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 9 19:52:29.129250 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:52:29.129269 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:52:29.129286 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:52:29.129304 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:52:29.129322 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:52:29.129345 kernel: iommu: Default domain type: Translated Feb 9 19:52:29.129363 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:52:29.129381 kernel: vgaarb: loaded Feb 9 19:52:29.129399 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:52:29.129417 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:52:29.129442 kernel: PTP clock support registered Feb 9 19:52:29.129460 kernel: Registered efivars operations Feb 9 19:52:29.129477 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:52:29.129495 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:52:29.129513 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 9 19:52:29.129535 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 9 19:52:29.129552 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 9 19:52:29.129569 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 9 19:52:29.129587 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:52:29.129604 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:52:29.129621 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:52:29.129637 kernel: pnp: PnP ACPI init Feb 9 19:52:29.129655 kernel: pnp: PnP ACPI: found 7 devices Feb 9 19:52:29.129676 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:52:29.129694 kernel: NET: Registered PF_INET protocol family Feb 9 19:52:29.129712 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:52:29.129730 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:52:29.129748 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:52:29.129766 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:52:29.129783 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:52:29.129801 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:52:29.129819 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:52:29.129840 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:52:29.129858 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:52:29.129876 kernel: NET: Registered PF_XDP protocol family Feb 9 19:52:29.130030 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:52:29.135388 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:52:29.135695 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:52:29.136109 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 9 19:52:29.136391 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:52:29.136429 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:52:29.136447 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:52:29.136464 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 9 19:52:29.136481 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:52:29.136498 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:52:29.136514 kernel: clocksource: Switched to clocksource tsc Feb 9 19:52:29.136530 kernel: Initialise system trusted keyrings Feb 9 19:52:29.136546 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:52:29.136565 kernel: Key type asymmetric registered Feb 9 19:52:29.136582 kernel: Asymmetric key parser 'x509' registered Feb 9 19:52:29.136598 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:52:29.136614 kernel: io scheduler mq-deadline registered Feb 9 19:52:29.136630 kernel: io scheduler kyber registered Feb 9 19:52:29.136646 kernel: io scheduler bfq registered Feb 9 19:52:29.136662 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:52:29.136679 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:52:29.136832 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 9 19:52:29.136856 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:52:29.137007 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 9 19:52:29.137029 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:52:29.137199 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 9 19:52:29.137222 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:52:29.137239 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:52:29.137256 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:52:29.137273 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 9 19:52:29.137289 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 9 19:52:29.137467 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 9 19:52:29.137492 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:52:29.137509 kernel: i8042: Warning: Keylock active Feb 9 19:52:29.137526 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:52:29.137544 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:52:29.137709 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:52:29.137859 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:52:29.138011 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:52:28 UTC (1707508348) Feb 9 19:52:29.138188 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:52:29.138212 kernel: intel_pstate: CPU model not supported Feb 9 19:52:29.138230 kernel: pstore: Registered efi as persistent store backend Feb 9 19:52:29.138248 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:52:29.138267 kernel: Segment Routing with IPv6 Feb 9 19:52:29.138285 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:52:29.138302 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:52:29.138320 kernel: Key type dns_resolver registered Feb 9 19:52:29.138342 kernel: IPI shorthand broadcast: enabled Feb 9 19:52:29.138361 kernel: sched_clock: Marking stable (725006607, 128147391)->(896240967, -43086969) Feb 9 19:52:29.138378 kernel: registered taskstats version 1 Feb 9 19:52:29.138396 kernel: Loading compiled-in X.509 certificates Feb 9 19:52:29.138414 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:52:29.138439 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:52:29.138457 kernel: Key type .fscrypt registered Feb 9 19:52:29.138475 kernel: Key type fscrypt-provisioning registered Feb 9 19:52:29.138493 kernel: pstore: Using crash dump compression: deflate Feb 9 19:52:29.138515 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:52:29.138533 kernel: ima: No architecture policies found Feb 9 19:52:29.138551 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:52:29.138568 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:52:29.138585 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:52:29.138603 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:52:29.138620 kernel: Run /init as init process Feb 9 19:52:29.138638 kernel: with arguments: Feb 9 19:52:29.138660 kernel: /init Feb 9 19:52:29.138677 kernel: with environment: Feb 9 19:52:29.138694 kernel: HOME=/ Feb 9 19:52:29.138711 kernel: TERM=linux Feb 9 19:52:29.138729 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:52:29.138751 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:52:29.138773 systemd[1]: Detected virtualization kvm. Feb 9 19:52:29.138793 systemd[1]: Detected architecture x86-64. Feb 9 19:52:29.138815 systemd[1]: Running in initrd. Feb 9 19:52:29.138833 systemd[1]: No hostname configured, using default hostname. Feb 9 19:52:29.138851 systemd[1]: Hostname set to . Feb 9 19:52:29.138870 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:52:29.138889 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:52:29.138907 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:52:29.138925 systemd[1]: Reached target cryptsetup.target. Feb 9 19:52:29.138944 systemd[1]: Reached target paths.target. Feb 9 19:52:29.138966 systemd[1]: Reached target slices.target. Feb 9 19:52:29.138984 systemd[1]: Reached target swap.target. Feb 9 19:52:29.139003 systemd[1]: Reached target timers.target. Feb 9 19:52:29.139022 systemd[1]: Listening on iscsid.socket. Feb 9 19:52:29.139041 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:52:29.139060 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:52:29.157105 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:52:29.157142 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:52:29.157169 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:52:29.157188 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:52:29.157208 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:52:29.157226 systemd[1]: Reached target sockets.target. Feb 9 19:52:29.157245 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:52:29.157263 systemd[1]: Finished network-cleanup.service. Feb 9 19:52:29.157282 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:52:29.157301 systemd[1]: Starting systemd-journald.service... Feb 9 19:52:29.157320 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:52:29.157342 systemd[1]: Starting systemd-resolved.service... Feb 9 19:52:29.157361 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:52:29.157397 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:52:29.157421 kernel: audit: type=1130 audit(1707508349.121:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.157442 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:52:29.157461 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:52:29.157484 kernel: audit: type=1130 audit(1707508349.129:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.157503 kernel: audit: type=1130 audit(1707508349.138:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.157522 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:52:29.157541 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:52:29.157565 systemd-journald[189]: Journal started Feb 9 19:52:29.157671 systemd-journald[189]: Runtime Journal (/run/log/journal/6ac3e805b7f7d176d270d44f88aa6ce5) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:52:29.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.156876 systemd-modules-load[190]: Inserted module 'overlay' Feb 9 19:52:29.170709 systemd[1]: Started systemd-journald.service. Feb 9 19:52:29.170785 kernel: audit: type=1130 audit(1707508349.160:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.171637 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:52:29.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.177154 kernel: audit: type=1130 audit(1707508349.170:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.190123 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:52:29.202799 kernel: audit: type=1130 audit(1707508349.193:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.195535 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:52:29.221117 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:52:29.223791 dracut-cmdline[205]: dracut-dracut-053 Feb 9 19:52:29.228212 kernel: Bridge firewalling registered Feb 9 19:52:29.226748 systemd-modules-load[190]: Inserted module 'br_netfilter' Feb 9 19:52:29.227617 systemd-resolved[191]: Positive Trust Anchors: Feb 9 19:52:29.236210 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:52:29.227636 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:52:29.265270 kernel: audit: type=1130 audit(1707508349.249:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.227694 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:52:29.276203 kernel: SCSI subsystem initialized Feb 9 19:52:29.235789 systemd-resolved[191]: Defaulting to hostname 'linux'. Feb 9 19:52:29.237357 systemd[1]: Started systemd-resolved.service. Feb 9 19:52:29.250369 systemd[1]: Reached target nss-lookup.target. Feb 9 19:52:29.291114 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:52:29.292093 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:52:29.294095 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:52:29.298369 systemd-modules-load[190]: Inserted module 'dm_multipath' Feb 9 19:52:29.299980 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:52:29.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.314464 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:52:29.318213 kernel: audit: type=1130 audit(1707508349.310:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.326809 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:52:29.337224 kernel: audit: type=1130 audit(1707508349.329:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.337262 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:52:29.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.350100 kernel: iscsi: registered transport (tcp) Feb 9 19:52:29.375122 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:52:29.375204 kernel: QLogic iSCSI HBA Driver Feb 9 19:52:29.418777 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:52:29.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.420383 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:52:29.478126 kernel: raid6: avx2x4 gen() 18159 MB/s Feb 9 19:52:29.495115 kernel: raid6: avx2x4 xor() 8162 MB/s Feb 9 19:52:29.513114 kernel: raid6: avx2x2 gen() 18051 MB/s Feb 9 19:52:29.530115 kernel: raid6: avx2x2 xor() 18563 MB/s Feb 9 19:52:29.547106 kernel: raid6: avx2x1 gen() 13371 MB/s Feb 9 19:52:29.564116 kernel: raid6: avx2x1 xor() 16185 MB/s Feb 9 19:52:29.581110 kernel: raid6: sse2x4 gen() 11065 MB/s Feb 9 19:52:29.598120 kernel: raid6: sse2x4 xor() 6675 MB/s Feb 9 19:52:29.615111 kernel: raid6: sse2x2 gen() 12033 MB/s Feb 9 19:52:29.632112 kernel: raid6: sse2x2 xor() 7459 MB/s Feb 9 19:52:29.649111 kernel: raid6: sse2x1 gen() 10584 MB/s Feb 9 19:52:29.666591 kernel: raid6: sse2x1 xor() 5181 MB/s Feb 9 19:52:29.666631 kernel: raid6: using algorithm avx2x4 gen() 18159 MB/s Feb 9 19:52:29.666653 kernel: raid6: .... xor() 8162 MB/s, rmw enabled Feb 9 19:52:29.667279 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:52:29.682116 kernel: xor: automatically using best checksumming function avx Feb 9 19:52:29.789115 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:52:29.800189 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:52:29.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.800000 audit: BPF prog-id=7 op=LOAD Feb 9 19:52:29.800000 audit: BPF prog-id=8 op=LOAD Feb 9 19:52:29.802399 systemd[1]: Starting systemd-udevd.service... Feb 9 19:52:29.818470 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 9 19:52:29.825449 systemd[1]: Started systemd-udevd.service. Feb 9 19:52:29.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.830482 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:52:29.851109 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Feb 9 19:52:29.893319 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:52:29.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:29.895534 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:52:29.964342 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:52:29.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:30.045100 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:52:30.092296 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:52:30.092388 kernel: AES CTR mode by8 optimization enabled Feb 9 19:52:30.098534 kernel: scsi host0: Virtio SCSI HBA Feb 9 19:52:30.130215 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 9 19:52:30.197838 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 9 19:52:30.198117 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 9 19:52:30.198341 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 9 19:52:30.212484 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 9 19:52:30.212812 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 19:52:30.234423 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:52:30.234508 kernel: GPT:17805311 != 25165823 Feb 9 19:52:30.234531 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:52:30.240534 kernel: GPT:17805311 != 25165823 Feb 9 19:52:30.244227 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:52:30.249671 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:52:30.261095 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 9 19:52:30.319647 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:52:30.335352 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (451) Feb 9 19:52:30.345219 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:52:30.360095 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:52:30.380067 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:52:30.388406 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:52:30.401445 systemd[1]: Starting disk-uuid.service... Feb 9 19:52:30.437234 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:52:30.437439 disk-uuid[521]: Primary Header is updated. Feb 9 19:52:30.437439 disk-uuid[521]: Secondary Entries is updated. Feb 9 19:52:30.437439 disk-uuid[521]: Secondary Header is updated. Feb 9 19:52:30.463203 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:52:31.444597 disk-uuid[522]: The operation has completed successfully. Feb 9 19:52:31.453211 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:52:31.510069 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:52:31.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.510216 systemd[1]: Finished disk-uuid.service. Feb 9 19:52:31.548182 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:52:31.521587 systemd[1]: Starting verity-setup.service... Feb 9 19:52:31.636954 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:52:31.639540 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:52:31.651687 systemd[1]: Finished verity-setup.service. Feb 9 19:52:31.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.750100 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:52:31.751101 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:52:31.764435 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:52:31.765605 systemd[1]: Starting ignition-setup.service... Feb 9 19:52:31.797484 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:52:31.797556 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:52:31.797580 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:52:31.811190 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:52:31.836304 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:52:31.839249 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:52:31.858225 systemd[1]: Finished ignition-setup.service. Feb 9 19:52:31.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.868486 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:52:31.919348 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:52:31.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.919000 audit: BPF prog-id=9 op=LOAD Feb 9 19:52:31.921339 systemd[1]: Starting systemd-networkd.service... Feb 9 19:52:31.952773 systemd-networkd[694]: lo: Link UP Feb 9 19:52:31.952785 systemd-networkd[694]: lo: Gained carrier Feb 9 19:52:31.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.953942 systemd-networkd[694]: Enumeration completed Feb 9 19:52:31.954070 systemd[1]: Started systemd-networkd.service. Feb 9 19:52:31.954536 systemd-networkd[694]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:52:32.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.956591 systemd-networkd[694]: eth0: Link UP Feb 9 19:52:32.039211 iscsid[699]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:52:32.039211 iscsid[699]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:52:32.039211 iscsid[699]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:52:32.039211 iscsid[699]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:52:32.039211 iscsid[699]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:52:32.039211 iscsid[699]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:52:32.039211 iscsid[699]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:52:32.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:32.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.956598 systemd-networkd[694]: eth0: Gained carrier Feb 9 19:52:32.185746 ignition[641]: Ignition 2.14.0 Feb 9 19:52:31.968702 systemd[1]: Reached target network.target. Feb 9 19:52:32.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:32.185761 ignition[641]: Stage: fetch-offline Feb 9 19:52:32.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:31.968842 systemd-networkd[694]: eth0: DHCPv4 address 10.128.0.37/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:52:32.185834 ignition[641]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:31.985386 systemd[1]: Starting iscsiuio.service... Feb 9 19:52:32.185870 ignition[641]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:31.995193 systemd[1]: Started iscsiuio.service. Feb 9 19:52:32.207602 ignition[641]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:32.013862 systemd[1]: Starting iscsid.service... Feb 9 19:52:32.207922 ignition[641]: parsed url from cmdline: "" Feb 9 19:52:32.031441 systemd[1]: Started iscsid.service. Feb 9 19:52:32.207929 ignition[641]: no config URL provided Feb 9 19:52:32.048841 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:52:32.207938 ignition[641]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:52:32.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:32.094537 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:52:32.207948 ignition[641]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:52:32.123437 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:52:32.207958 ignition[641]: failed to fetch config: resource requires networking Feb 9 19:52:32.140332 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:52:32.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:32.208127 ignition[641]: Ignition finished successfully Feb 9 19:52:32.150457 systemd[1]: Reached target remote-fs.target. Feb 9 19:52:32.243548 ignition[718]: Ignition 2.14.0 Feb 9 19:52:32.187662 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:52:32.243558 ignition[718]: Stage: fetch Feb 9 19:52:32.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:32.204021 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:52:32.243671 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:32.214603 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:52:32.243700 ignition[718]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:32.231527 systemd[1]: Starting ignition-fetch.service... Feb 9 19:52:32.250005 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:32.304132 unknown[718]: fetched base config from "system" Feb 9 19:52:32.250386 ignition[718]: parsed url from cmdline: "" Feb 9 19:52:32.304145 unknown[718]: fetched base config from "system" Feb 9 19:52:32.250393 ignition[718]: no config URL provided Feb 9 19:52:32.304157 unknown[718]: fetched user config from "gcp" Feb 9 19:52:32.250403 ignition[718]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:52:32.312668 systemd[1]: Finished ignition-fetch.service. Feb 9 19:52:32.250419 ignition[718]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:52:32.329601 systemd[1]: Starting ignition-kargs.service... Feb 9 19:52:32.250468 ignition[718]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 9 19:52:32.357705 systemd[1]: Finished ignition-kargs.service. Feb 9 19:52:32.260733 ignition[718]: GET result: OK Feb 9 19:52:32.386836 systemd[1]: Starting ignition-disks.service... Feb 9 19:52:32.260844 ignition[718]: parsing config with SHA512: 265772165bf00fe2ae2f3aff0001ce79eed06a4bfbb647d753bfdd352d05852dd8a6f626b9fdb1a225bb9e64ff9a7f3b42cda32c9507d350685ff8043e43c894 Feb 9 19:52:32.421675 systemd[1]: Finished ignition-disks.service. Feb 9 19:52:32.310949 ignition[718]: fetch: fetch complete Feb 9 19:52:32.429545 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:52:32.310960 ignition[718]: fetch: fetch passed Feb 9 19:52:32.449311 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:52:32.311030 ignition[718]: Ignition finished successfully Feb 9 19:52:32.463307 systemd[1]: Reached target local-fs.target. Feb 9 19:52:32.343565 ignition[724]: Ignition 2.14.0 Feb 9 19:52:32.463428 systemd[1]: Reached target sysinit.target. Feb 9 19:52:32.343576 ignition[724]: Stage: kargs Feb 9 19:52:32.488269 systemd[1]: Reached target basic.target. Feb 9 19:52:32.343706 ignition[724]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:32.503515 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:52:32.343741 ignition[724]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:32.352584 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:32.354253 ignition[724]: kargs: kargs passed Feb 9 19:52:32.354310 ignition[724]: Ignition finished successfully Feb 9 19:52:32.397488 ignition[730]: Ignition 2.14.0 Feb 9 19:52:32.397496 ignition[730]: Stage: disks Feb 9 19:52:32.397617 ignition[730]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:32.397642 ignition[730]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:32.405402 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:32.408186 ignition[730]: disks: disks passed Feb 9 19:52:32.408238 ignition[730]: Ignition finished successfully Feb 9 19:52:32.563832 systemd-fsck[738]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:52:32.734010 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:52:32.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:32.735310 systemd[1]: Mounting sysroot.mount... Feb 9 19:52:32.770376 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:52:32.764684 systemd[1]: Mounted sysroot.mount. Feb 9 19:52:32.777502 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:52:32.794677 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:52:32.807778 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:52:32.807835 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:52:32.807869 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:52:32.893712 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (744) Feb 9 19:52:32.893756 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:52:32.893778 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:52:32.893800 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:52:32.823511 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:52:32.850307 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:52:32.914516 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:52:32.940398 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:52:32.935511 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:52:32.958423 initrd-setup-root[767]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:52:32.969254 initrd-setup-root[775]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:52:32.979207 initrd-setup-root[783]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:52:32.989238 initrd-setup-root[791]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:52:33.031656 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:52:33.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:33.032959 systemd[1]: Starting ignition-mount.service... Feb 9 19:52:33.061507 systemd[1]: Starting sysroot-boot.service... Feb 9 19:52:33.069485 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:52:33.069599 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:52:33.098263 ignition[809]: INFO : Ignition 2.14.0 Feb 9 19:52:33.098263 ignition[809]: INFO : Stage: mount Feb 9 19:52:33.098263 ignition[809]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:33.098263 ignition[809]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:33.098263 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:33.264287 kernel: kauditd_printk_skb: 24 callbacks suppressed Feb 9 19:52:33.264342 kernel: audit: type=1130 audit(1707508353.113:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:33.264368 kernel: audit: type=1130 audit(1707508353.155:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:33.264391 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (820) Feb 9 19:52:33.264414 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:52:33.264434 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:52:33.264455 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:52:33.264468 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:52:33.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:33.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:33.264663 ignition[809]: INFO : mount: mount passed Feb 9 19:52:33.264663 ignition[809]: INFO : Ignition finished successfully Feb 9 19:52:33.101664 systemd[1]: Finished ignition-mount.service. Feb 9 19:52:33.116791 systemd[1]: Finished sysroot-boot.service. Feb 9 19:52:33.157734 systemd[1]: Starting ignition-files.service... Feb 9 19:52:33.310245 ignition[839]: INFO : Ignition 2.14.0 Feb 9 19:52:33.310245 ignition[839]: INFO : Stage: files Feb 9 19:52:33.310245 ignition[839]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:33.310245 ignition[839]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:33.310245 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:33.310245 ignition[839]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:52:33.310245 ignition[839]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:52:33.310245 ignition[839]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:52:33.176272 systemd-networkd[694]: eth0: Gained IPv6LL Feb 9 19:52:33.413218 ignition[839]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:52:33.413218 ignition[839]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:52:33.413218 ignition[839]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:52:33.413218 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:52:33.413218 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:52:33.191429 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:52:33.259232 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:52:33.314433 unknown[839]: wrote ssh authorized keys file for user: core Feb 9 19:52:33.676362 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:52:33.913451 ignition[839]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:52:33.938275 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:52:33.938275 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:52:33.938275 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 9 19:52:33.990244 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:52:34.092950 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 9 19:52:34.120232 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (839) Feb 9 19:52:34.120166 systemd[1]: mnt-oem2649812726.mount: Deactivated successfully. Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2649812726" Feb 9 19:52:34.129225 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2649812726": device or resource busy Feb 9 19:52:34.129225 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2649812726", trying btrfs: device or resource busy Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2649812726" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2649812726" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem2649812726" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem2649812726" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:52:34.129225 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:52:34.336259 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 9 19:52:34.394282 ignition[839]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:52:34.418237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:52:34.418237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:52:34.418237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 9 19:52:34.467398 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 9 19:52:34.737504 ignition[839]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274651537" Feb 9 19:52:34.761226 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274651537": device or resource busy Feb 9 19:52:34.761226 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2274651537", trying btrfs: device or resource busy Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274651537" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2274651537" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem2274651537" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2274651537" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:52:34.761226 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:52:34.751007 systemd[1]: mnt-oem2274651537.mount: Deactivated successfully. Feb 9 19:52:34.989272 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 9 19:52:34.989272 ignition[839]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:52:34.989272 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:52:34.989272 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:52:34.989272 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:52:35.071247 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 9 19:52:35.565383 ignition[839]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:52:35.590237 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175525464" Feb 9 19:52:36.032345 kernel: audit: type=1130 audit(1707508355.637:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.032386 kernel: audit: type=1130 audit(1707508355.750:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.032404 kernel: audit: type=1130 audit(1707508355.809:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.032426 kernel: audit: type=1131 audit(1707508355.809:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.032440 kernel: audit: type=1130 audit(1707508355.909:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.032455 kernel: audit: type=1131 audit(1707508355.909:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.585530 systemd[1]: mnt-oem3175525464.mount: Deactivated successfully. Feb 9 19:52:36.048357 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175525464": device or resource busy Feb 9 19:52:36.048357 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3175525464", trying btrfs: device or resource busy Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175525464" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3175525464" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem3175525464" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem3175525464" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2351242092" Feb 9 19:52:36.048357 ignition[839]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2351242092": device or resource busy Feb 9 19:52:36.048357 ignition[839]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2351242092", trying btrfs: device or resource busy Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2351242092" Feb 9 19:52:36.048357 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2351242092" Feb 9 19:52:36.363462 kernel: audit: type=1130 audit(1707508356.055:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.363499 kernel: audit: type=1131 audit(1707508356.257:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.615850 systemd[1]: mnt-oem2351242092.mount: Deactivated successfully. Feb 9 19:52:36.396269 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem2351242092" Feb 9 19:52:36.396269 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem2351242092" Feb 9 19:52:36.396269 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(1f): [started] processing unit "oem-gce.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(1f): [finished] processing unit "oem-gce.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(20): [started] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(20): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(21): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(21): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 9 19:52:36.396269 ignition[839]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:52:36.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.627326 systemd[1]: Finished ignition-files.service. Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(28): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(28): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(29): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(29): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2a): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2a): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2b): [started] setting preset to enabled for "prepare-helm.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2b): [finished] setting preset to enabled for "prepare-helm.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2c): [started] setting preset to enabled for "oem-gce.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2c): [finished] setting preset to enabled for "oem-gce.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2d): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: op(2d): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:52:36.750259 ignition[839]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:52:36.750259 ignition[839]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:52:36.750259 ignition[839]: INFO : files: files passed Feb 9 19:52:36.750259 ignition[839]: INFO : Ignition finished successfully Feb 9 19:52:36.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:37.105716 initrd-setup-root-after-ignition[862]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:52:35.648656 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:52:37.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.703390 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:52:37.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.704591 systemd[1]: Starting ignition-quench.service... Feb 9 19:52:35.719745 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:52:35.751945 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:52:37.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.752123 systemd[1]: Finished ignition-quench.service. Feb 9 19:52:37.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.810490 systemd[1]: Reached target ignition-complete.target. Feb 9 19:52:37.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:37.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:37.238000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:52:37.247495 ignition[877]: INFO : Ignition 2.14.0 Feb 9 19:52:37.247495 ignition[877]: INFO : Stage: umount Feb 9 19:52:37.247495 ignition[877]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:52:37.247495 ignition[877]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:52:37.247495 ignition[877]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:52:37.247495 ignition[877]: INFO : umount: umount passed Feb 9 19:52:37.247495 ignition[877]: INFO : Ignition finished successfully Feb 9 19:52:37.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:37.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:37.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.867577 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:52:37.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:35.909855 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:52:35.909978 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:52:35.910566 systemd[1]: Reached target initrd-fs.target. Feb 9 19:52:35.971461 systemd[1]: Reached target initrd.target. Feb 9 19:52:37.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.015484 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:52:37.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.016680 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:52:37.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.039582 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:52:36.057659 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:52:36.129032 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:52:37.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.159621 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:52:37.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.195601 systemd[1]: Stopped target timers.target. Feb 9 19:52:37.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:37.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:36.212650 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:52:36.212843 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:52:36.258954 systemd[1]: Stopped target initrd.target. Feb 9 19:52:36.295670 systemd[1]: Stopped target basic.target. Feb 9 19:52:36.346597 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:52:37.593889 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Feb 9 19:52:36.387602 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:52:37.602237 iscsid[699]: iscsid shutting down. Feb 9 19:52:36.396604 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:52:36.417662 systemd[1]: Stopped target remote-fs.target. Feb 9 19:52:36.462573 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:52:36.490643 systemd[1]: Stopped target sysinit.target. Feb 9 19:52:36.503611 systemd[1]: Stopped target local-fs.target. Feb 9 19:52:36.539539 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:52:36.570518 systemd[1]: Stopped target swap.target. Feb 9 19:52:36.612640 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:52:36.612848 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:52:36.625712 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:52:36.643580 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:52:36.643776 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:52:36.691698 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:52:36.691886 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:52:36.702705 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:52:36.702901 systemd[1]: Stopped ignition-files.service. Feb 9 19:52:36.722178 systemd[1]: Stopping ignition-mount.service... Feb 9 19:52:36.757369 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:52:36.757614 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:52:36.793007 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:52:36.805475 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:52:36.805764 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:52:36.831554 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:52:36.831730 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:52:36.856225 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:52:36.857183 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:52:36.857300 systemd[1]: Stopped ignition-mount.service. Feb 9 19:52:36.873889 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:52:36.874042 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:52:36.893908 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:52:36.894135 systemd[1]: Stopped ignition-disks.service. Feb 9 19:52:36.914362 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:52:36.914446 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:52:36.935373 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:52:36.935444 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:52:36.956314 systemd[1]: Stopped target network.target. Feb 9 19:52:36.977251 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:52:36.977359 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:52:36.998411 systemd[1]: Stopped target paths.target. Feb 9 19:52:37.019215 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:52:37.021164 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:52:37.041258 systemd[1]: Stopped target slices.target. Feb 9 19:52:37.062264 systemd[1]: Stopped target sockets.target. Feb 9 19:52:37.083330 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:52:37.083388 systemd[1]: Closed iscsid.socket. Feb 9 19:52:37.097306 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:52:37.097365 systemd[1]: Closed iscsiuio.socket. Feb 9 19:52:37.112288 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:52:37.112379 systemd[1]: Stopped ignition-setup.service. Feb 9 19:52:37.134329 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:52:37.134407 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:52:37.152686 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:52:37.156149 systemd-networkd[694]: eth0: DHCPv6 lease lost Feb 9 19:52:37.611000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:52:37.176440 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:52:37.191899 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:52:37.192031 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:52:37.208193 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:52:37.208326 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:52:37.225092 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:52:37.225212 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:52:37.240586 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:52:37.240732 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:52:37.256406 systemd[1]: Stopping network-cleanup.service... Feb 9 19:52:37.269216 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:52:37.269338 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:52:37.283326 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:52:37.283393 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:52:37.302446 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:52:37.302506 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:52:37.329498 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:52:37.342012 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:52:37.342634 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:52:37.342783 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:52:37.368898 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:52:37.368984 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:52:37.392279 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:52:37.392340 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:52:37.407304 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:52:37.407392 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:52:37.422402 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:52:37.422470 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:52:37.437341 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:52:37.437417 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:52:37.457414 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:52:37.479345 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:52:37.479450 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:52:37.495060 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:52:37.495243 systemd[1]: Stopped network-cleanup.service. Feb 9 19:52:37.509697 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:52:37.509805 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:52:37.525635 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:52:37.541397 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:52:37.563718 systemd[1]: Switching root. Feb 9 19:52:37.614083 systemd-journald[189]: Journal stopped Feb 9 19:52:42.368008 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:52:42.368122 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:52:42.368145 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:52:42.368160 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:52:42.368178 kernel: SELinux: policy capability open_perms=1 Feb 9 19:52:42.368193 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:52:42.368207 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:52:42.368221 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:52:42.368236 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:52:42.368249 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:52:42.368262 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:52:42.368281 systemd[1]: Successfully loaded SELinux policy in 113.996ms. Feb 9 19:52:42.368313 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.546ms. Feb 9 19:52:42.368332 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:52:42.368353 systemd[1]: Detected virtualization kvm. Feb 9 19:52:42.368367 systemd[1]: Detected architecture x86-64. Feb 9 19:52:42.368383 systemd[1]: Detected first boot. Feb 9 19:52:42.368399 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:52:42.368413 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:52:42.368432 kernel: kauditd_printk_skb: 39 callbacks suppressed Feb 9 19:52:42.368452 kernel: audit: type=1400 audit(1707508358.214:84): avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:52:42.368472 kernel: audit: type=1300 audit(1707508358.214:84): arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:42.368487 kernel: audit: type=1327 audit(1707508358.214:84): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:52:42.368502 kernel: audit: type=1400 audit(1707508358.226:85): avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:52:42.368517 kernel: audit: type=1300 audit(1707508358.226:85): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:42.368534 kernel: audit: type=1307 audit(1707508358.226:85): cwd="/" Feb 9 19:52:42.368549 kernel: audit: type=1302 audit(1707508358.226:85): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:42.368564 kernel: audit: type=1302 audit(1707508358.226:85): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:42.368579 kernel: audit: type=1327 audit(1707508358.226:85): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:52:42.368593 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:52:42.368609 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:52:42.368625 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:52:42.368645 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:52:42.368660 kernel: audit: type=1334 audit(1707508361.505:86): prog-id=12 op=LOAD Feb 9 19:52:42.368674 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:52:42.368688 systemd[1]: Stopped iscsiuio.service. Feb 9 19:52:42.368703 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:52:42.368718 systemd[1]: Stopped iscsid.service. Feb 9 19:52:42.368733 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:52:42.368748 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:52:42.368767 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:52:42.368782 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:52:42.368797 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:52:42.368812 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:52:42.368826 systemd[1]: Created slice system-getty.slice. Feb 9 19:52:42.368842 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:52:42.368858 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:52:42.368875 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:52:42.368891 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:52:42.368905 systemd[1]: Created slice user.slice. Feb 9 19:52:42.368920 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:52:42.368935 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:52:42.368949 systemd[1]: Set up automount boot.automount. Feb 9 19:52:42.368964 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:52:42.368978 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:52:42.368993 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:52:42.369010 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:52:42.369024 systemd[1]: Reached target integritysetup.target. Feb 9 19:52:42.369042 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:52:42.369057 systemd[1]: Reached target remote-fs.target. Feb 9 19:52:42.369092 systemd[1]: Reached target slices.target. Feb 9 19:52:42.369117 systemd[1]: Reached target swap.target. Feb 9 19:52:42.369138 systemd[1]: Reached target torcx.target. Feb 9 19:52:42.369161 systemd[1]: Reached target veritysetup.target. Feb 9 19:52:42.369181 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:52:42.369205 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:52:42.369232 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:52:42.369255 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:52:42.369277 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:52:42.369298 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:52:42.369320 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:52:42.369342 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:52:42.369364 systemd[1]: Mounting media.mount... Feb 9 19:52:42.369386 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:52:42.369408 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:52:42.369434 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:52:42.369456 systemd[1]: Mounting tmp.mount... Feb 9 19:52:42.369477 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:52:42.369499 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:52:42.369523 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:52:42.369547 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:52:42.369569 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:52:42.369595 systemd[1]: Starting modprobe@drm.service... Feb 9 19:52:42.369617 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:52:42.369645 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:52:42.369668 systemd[1]: Starting modprobe@loop.service... Feb 9 19:52:42.369690 kernel: fuse: init (API version 7.34) Feb 9 19:52:42.369715 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:52:42.369738 kernel: loop: module loaded Feb 9 19:52:42.369761 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:52:42.369785 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:52:42.369808 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:52:42.369832 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:52:42.369863 systemd[1]: Stopped systemd-journald.service. Feb 9 19:52:42.369888 systemd[1]: Starting systemd-journald.service... Feb 9 19:52:42.369913 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:52:42.369939 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:52:42.369970 systemd-journald[1001]: Journal started Feb 9 19:52:42.370069 systemd-journald[1001]: Runtime Journal (/run/log/journal/6ac3e805b7f7d176d270d44f88aa6ce5) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:52:37.907000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:52:38.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:52:38.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:52:38.056000 audit: BPF prog-id=10 op=LOAD Feb 9 19:52:38.056000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:52:38.056000 audit: BPF prog-id=11 op=LOAD Feb 9 19:52:38.056000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:52:38.214000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:52:38.214000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:38.214000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:52:38.226000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:52:38.226000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:38.226000 audit: CWD cwd="/" Feb 9 19:52:38.226000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:38.226000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:38.226000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:52:41.505000 audit: BPF prog-id=12 op=LOAD Feb 9 19:52:41.505000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:52:41.512000 audit: BPF prog-id=13 op=LOAD Feb 9 19:52:41.512000 audit: BPF prog-id=14 op=LOAD Feb 9 19:52:41.512000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:52:41.512000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:52:41.514000 audit: BPF prog-id=15 op=LOAD Feb 9 19:52:41.514000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:52:41.514000 audit: BPF prog-id=16 op=LOAD Feb 9 19:52:41.514000 audit: BPF prog-id=17 op=LOAD Feb 9 19:52:41.514000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:52:41.514000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:52:41.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:41.531000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:52:41.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:41.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:41.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:41.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.318000 audit: BPF prog-id=18 op=LOAD Feb 9 19:52:42.318000 audit: BPF prog-id=19 op=LOAD Feb 9 19:52:42.318000 audit: BPF prog-id=20 op=LOAD Feb 9 19:52:42.318000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:52:42.318000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:52:42.365000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:52:42.365000 audit[1001]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff921a3570 a2=4000 a3=7fff921a360c items=0 ppid=1 pid=1001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:42.365000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:52:38.210578 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:52:41.504711 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:52:38.212065 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:52:41.517366 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:52:38.212124 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:52:38.212176 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:52:38.212196 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:52:38.212262 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:52:38.212287 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:52:38.212591 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:52:38.212652 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:52:38.212677 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:52:38.213838 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:52:38.213901 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:52:38.213935 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:52:38.213964 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:52:38.213997 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:52:38.214024 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:52:40.889894 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:52:40.890218 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:52:40.890372 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:52:40.890592 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:52:40.890650 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:52:40.890726 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2024-02-09T19:52:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:52:42.377112 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:52:42.392110 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:52:42.406098 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:52:42.412341 systemd[1]: Stopped verity-setup.service. Feb 9 19:52:42.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.431106 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:52:42.440128 systemd[1]: Started systemd-journald.service. Feb 9 19:52:42.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.449536 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:52:42.457452 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:52:42.464426 systemd[1]: Mounted media.mount. Feb 9 19:52:42.471412 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:52:42.480390 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:52:42.489360 systemd[1]: Mounted tmp.mount. Feb 9 19:52:42.496511 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:52:42.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.505593 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:52:42.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.514610 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:52:42.514828 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:52:42.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.523619 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:52:42.523834 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:52:42.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.532688 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:52:42.532895 systemd[1]: Finished modprobe@drm.service. Feb 9 19:52:42.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.541617 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:52:42.541829 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:52:42.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.550747 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:52:42.551023 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:52:42.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.559693 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:52:42.559917 systemd[1]: Finished modprobe@loop.service. Feb 9 19:52:42.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.568778 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:52:42.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.577678 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:52:42.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.586673 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:52:42.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.595762 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:52:42.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.605144 systemd[1]: Reached target network-pre.target. Feb 9 19:52:42.614732 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:52:42.625660 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:52:42.633234 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:52:42.636355 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:52:42.645876 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:52:42.654244 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:52:42.655928 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:52:42.657412 systemd-journald[1001]: Time spent on flushing to /var/log/journal/6ac3e805b7f7d176d270d44f88aa6ce5 is 80.966ms for 1180 entries. Feb 9 19:52:42.657412 systemd-journald[1001]: System Journal (/var/log/journal/6ac3e805b7f7d176d270d44f88aa6ce5) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:52:42.762515 systemd-journald[1001]: Received client request to flush runtime journal. Feb 9 19:52:42.726000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.671277 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:52:42.673022 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:52:42.681918 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:52:42.763719 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:52:42.690772 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:52:42.701519 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:52:42.710384 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:52:42.719195 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:52:42.727748 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:52:42.739829 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:52:42.761797 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:52:42.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:42.770866 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:52:42.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.343572 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:52:43.357644 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 9 19:52:43.357763 kernel: audit: type=1130 audit(1707508363.351:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.378000 audit: BPF prog-id=21 op=LOAD Feb 9 19:52:43.394214 kernel: audit: type=1334 audit(1707508363.378:139): prog-id=21 op=LOAD Feb 9 19:52:43.394331 kernel: audit: type=1334 audit(1707508363.386:140): prog-id=22 op=LOAD Feb 9 19:52:43.386000 audit: BPF prog-id=22 op=LOAD Feb 9 19:52:43.386000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:52:43.394623 systemd[1]: Starting systemd-udevd.service... Feb 9 19:52:43.401602 kernel: audit: type=1334 audit(1707508363.386:141): prog-id=7 op=UNLOAD Feb 9 19:52:43.401690 kernel: audit: type=1334 audit(1707508363.386:142): prog-id=8 op=UNLOAD Feb 9 19:52:43.386000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:52:43.429868 systemd-udevd[1019]: Using default interface naming scheme 'v252'. Feb 9 19:52:43.481012 systemd[1]: Started systemd-udevd.service. Feb 9 19:52:43.515512 kernel: audit: type=1130 audit(1707508363.488:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.515275 systemd[1]: Starting systemd-networkd.service... Feb 9 19:52:43.530693 kernel: audit: type=1334 audit(1707508363.490:144): prog-id=23 op=LOAD Feb 9 19:52:43.490000 audit: BPF prog-id=23 op=LOAD Feb 9 19:52:43.536000 audit: BPF prog-id=24 op=LOAD Feb 9 19:52:43.546107 kernel: audit: type=1334 audit(1707508363.536:145): prog-id=24 op=LOAD Feb 9 19:52:43.547000 audit: BPF prog-id=25 op=LOAD Feb 9 19:52:43.554000 audit: BPF prog-id=26 op=LOAD Feb 9 19:52:43.560958 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:52:43.562666 kernel: audit: type=1334 audit(1707508363.547:146): prog-id=25 op=LOAD Feb 9 19:52:43.562744 kernel: audit: type=1334 audit(1707508363.554:147): prog-id=26 op=LOAD Feb 9 19:52:43.580778 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:52:43.636107 systemd[1]: Started systemd-userdbd.service. Feb 9 19:52:43.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.693119 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:52:43.754101 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:52:43.775757 systemd-networkd[1034]: lo: Link UP Feb 9 19:52:43.775778 systemd-networkd[1034]: lo: Gained carrier Feb 9 19:52:43.776601 systemd-networkd[1034]: Enumeration completed Feb 9 19:52:43.776749 systemd[1]: Started systemd-networkd.service. Feb 9 19:52:43.777020 systemd-networkd[1034]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:52:43.779065 systemd-networkd[1034]: eth0: Link UP Feb 9 19:52:43.779102 systemd-networkd[1034]: eth0: Gained carrier Feb 9 19:52:43.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.796759 systemd-networkd[1034]: eth0: DHCPv4 address 10.128.0.37/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:52:43.762000 audit[1026]: AVC avc: denied { confidentiality } for pid=1026 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:52:43.762000 audit[1026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55852a3272c0 a1=32194 a2=7ff612540bc5 a3=5 items=108 ppid=1019 pid=1026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:43.762000 audit: CWD cwd="/" Feb 9 19:52:43.762000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=1 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=2 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=3 name=(null) inode=14148 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=4 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=5 name=(null) inode=14149 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=6 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=7 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=8 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=9 name=(null) inode=14151 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=10 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=11 name=(null) inode=14152 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=12 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=13 name=(null) inode=14153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=14 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=15 name=(null) inode=14154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=16 name=(null) inode=14150 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=17 name=(null) inode=14155 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=18 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=19 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=20 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=21 name=(null) inode=14157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=22 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=23 name=(null) inode=14158 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=24 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=25 name=(null) inode=14159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=26 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=27 name=(null) inode=14160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=28 name=(null) inode=14156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=29 name=(null) inode=14161 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=30 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=31 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=32 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=33 name=(null) inode=14163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=34 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=35 name=(null) inode=14164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=36 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=37 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=38 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=39 name=(null) inode=14166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=40 name=(null) inode=14162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=41 name=(null) inode=14167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=42 name=(null) inode=14147 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=43 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=44 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=45 name=(null) inode=14169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=46 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=47 name=(null) inode=14170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=48 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=49 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=50 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=51 name=(null) inode=14172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=52 name=(null) inode=14168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=53 name=(null) inode=14173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=55 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=56 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=57 name=(null) inode=14175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=58 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=59 name=(null) inode=14176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=60 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=61 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=62 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=63 name=(null) inode=14178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=64 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=65 name=(null) inode=14179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=66 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=67 name=(null) inode=14180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=68 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=69 name=(null) inode=14181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=70 name=(null) inode=14177 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=71 name=(null) inode=14182 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=72 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=73 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=74 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=75 name=(null) inode=14184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=76 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=77 name=(null) inode=14185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=78 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=79 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=80 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=81 name=(null) inode=14187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=82 name=(null) inode=14183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=83 name=(null) inode=14188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=84 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=85 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=86 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=87 name=(null) inode=14190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=88 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=89 name=(null) inode=14191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=90 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=91 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=92 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=93 name=(null) inode=14193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=94 name=(null) inode=14189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=95 name=(null) inode=14194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=96 name=(null) inode=14174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=97 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=98 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=99 name=(null) inode=14196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=100 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=101 name=(null) inode=14197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=102 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=103 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=104 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=105 name=(null) inode=14199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=106 name=(null) inode=14195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PATH item=107 name=(null) inode=14200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:52:43.762000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:52:43.816098 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 9 19:52:43.816170 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:52:43.852107 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 9 19:52:43.876143 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1043) Feb 9 19:52:43.900106 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:52:43.908106 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:52:43.919648 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:52:43.924136 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:52:43.941628 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:52:43.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:43.951912 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:52:43.982559 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:52:44.016462 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:52:44.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.025400 systemd[1]: Reached target cryptsetup.target. Feb 9 19:52:44.035736 systemd[1]: Starting lvm2-activation.service... Feb 9 19:52:44.041781 lvm[1057]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:52:44.068531 systemd[1]: Finished lvm2-activation.service. Feb 9 19:52:44.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.077440 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:52:44.086261 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:52:44.086311 systemd[1]: Reached target local-fs.target. Feb 9 19:52:44.095237 systemd[1]: Reached target machines.target. Feb 9 19:52:44.105868 systemd[1]: Starting ldconfig.service... Feb 9 19:52:44.114319 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:52:44.114411 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:52:44.116158 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:52:44.124894 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:52:44.137217 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:52:44.137669 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:52:44.137752 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:52:44.139787 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:52:44.140625 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1059 (bootctl) Feb 9 19:52:44.143814 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:52:44.174838 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:52:44.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.186000 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:52:44.199694 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:52:44.214182 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:52:44.311894 systemd-fsck[1069]: fsck.fat 4.2 (2021-01-31) Feb 9 19:52:44.311894 systemd-fsck[1069]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:52:44.312750 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:52:44.324026 systemd[1]: Mounting boot.mount... Feb 9 19:52:44.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.354722 systemd[1]: Mounted boot.mount. Feb 9 19:52:44.386268 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:52:44.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.485533 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:52:44.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.496613 systemd[1]: Starting audit-rules.service... Feb 9 19:52:44.505658 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:52:44.517154 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 9 19:52:44.527245 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:52:44.536000 audit: BPF prog-id=27 op=LOAD Feb 9 19:52:44.546000 audit: BPF prog-id=28 op=LOAD Feb 9 19:52:44.538985 systemd[1]: Starting systemd-resolved.service... Feb 9 19:52:44.658167 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:52:44.667190 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:52:44.676023 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:52:44.684663 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:52:44.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.695757 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:52:44.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.733000 audit[1088]: SYSTEM_BOOT pid=1088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.748136 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 9 19:52:44.748406 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 9 19:52:44.758645 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:52:44.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:44.793432 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:52:44.796417 systemd-timesyncd[1087]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 9 19:52:44.796911 systemd-timesyncd[1087]: Initial clock synchronization to Fri 2024-02-09 19:52:44.593700 UTC. Feb 9 19:52:44.798558 augenrules[1106]: No rules Feb 9 19:52:44.797000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:52:44.797000 audit[1106]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf5d9f100 a2=420 a3=0 items=0 ppid=1072 pid=1106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:44.797000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:52:44.800744 systemd[1]: Finished audit-rules.service. Feb 9 19:52:44.808295 systemd[1]: Reached target time-set.target. Feb 9 19:52:44.838215 systemd-resolved[1084]: Positive Trust Anchors: Feb 9 19:52:44.838609 systemd-resolved[1084]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:52:44.838733 systemd-resolved[1084]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:52:44.858292 ldconfig[1058]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:52:44.874599 systemd-resolved[1084]: Defaulting to hostname 'linux'. Feb 9 19:52:44.876767 systemd[1]: Started systemd-resolved.service. Feb 9 19:52:44.885375 systemd[1]: Reached target network.target. Feb 9 19:52:44.894242 systemd[1]: Reached target nss-lookup.target. Feb 9 19:52:45.078254 systemd-networkd[1034]: eth0: Gained IPv6LL Feb 9 19:52:45.174475 systemd[1]: Finished ldconfig.service. Feb 9 19:52:45.182951 systemd[1]: Starting systemd-update-done.service... Feb 9 19:52:45.192578 systemd[1]: Finished systemd-update-done.service. Feb 9 19:52:45.201397 systemd[1]: Reached target sysinit.target. Feb 9 19:52:45.209367 systemd[1]: Started motdgen.path. Feb 9 19:52:45.216312 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:52:45.226481 systemd[1]: Started logrotate.timer. Feb 9 19:52:45.233392 systemd[1]: Started mdadm.timer. Feb 9 19:52:45.240239 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:52:45.248204 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:52:45.248263 systemd[1]: Reached target paths.target. Feb 9 19:52:45.255226 systemd[1]: Reached target timers.target. Feb 9 19:52:45.262662 systemd[1]: Listening on dbus.socket. Feb 9 19:52:45.272041 systemd[1]: Starting docker.socket... Feb 9 19:52:45.282886 systemd[1]: Listening on sshd.socket. Feb 9 19:52:45.290342 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:52:45.292193 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:52:45.292939 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:52:45.301538 systemd[1]: Listening on docker.socket. Feb 9 19:52:45.308407 systemd[1]: Reached target sockets.target. Feb 9 19:52:45.317222 systemd[1]: Reached target basic.target. Feb 9 19:52:45.324279 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:52:45.324324 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:52:45.325873 systemd[1]: Starting containerd.service... Feb 9 19:52:45.334657 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:52:45.345654 systemd[1]: Starting dbus.service... Feb 9 19:52:45.352630 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:52:45.360825 systemd[1]: Starting extend-filesystems.service... Feb 9 19:52:45.368214 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:52:45.369952 systemd[1]: Starting motdgen.service... Feb 9 19:52:45.376354 jq[1118]: false Feb 9 19:52:45.378865 systemd[1]: Starting oem-gce.service... Feb 9 19:52:45.385229 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:52:45.393820 systemd[1]: Starting prepare-critools.service... Feb 9 19:52:45.405674 systemd[1]: Starting prepare-helm.service... Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda1 Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda2 Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda3 Feb 9 19:52:45.415865 extend-filesystems[1119]: Found usr Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda4 Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda6 Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda7 Feb 9 19:52:45.415865 extend-filesystems[1119]: Found sda9 Feb 9 19:52:45.415865 extend-filesystems[1119]: Checking size of /dev/sda9 Feb 9 19:52:45.584576 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 9 19:52:45.415003 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:52:45.585040 extend-filesystems[1119]: Resized partition /dev/sda9 Feb 9 19:52:45.574555 dbus-daemon[1117]: [system] SELinux support is enabled Feb 9 19:52:45.424020 systemd[1]: Starting sshd-keygen.service... Feb 9 19:52:45.626379 extend-filesystems[1165]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:52:45.606644 dbus-daemon[1117]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1034 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:52:45.435819 systemd[1]: Starting systemd-logind.service... Feb 9 19:52:45.616284 dbus-daemon[1117]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:52:45.443227 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:52:45.443354 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 9 19:52:45.648276 jq[1145]: true Feb 9 19:52:45.444108 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:52:45.445269 systemd[1]: Starting update-engine.service... Feb 9 19:52:45.649804 tar[1148]: ./ Feb 9 19:52:45.649804 tar[1148]: ./macvlan Feb 9 19:52:45.454204 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:52:45.651442 tar[1150]: linux-amd64/helm Feb 9 19:52:45.465901 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:52:45.466764 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:52:45.467356 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:52:45.653824 jq[1153]: true Feb 9 19:52:45.467621 systemd[1]: Finished motdgen.service. Feb 9 19:52:45.479842 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:52:45.656408 mkfs.ext4[1156]: mke2fs 1.46.5 (30-Dec-2021) Feb 9 19:52:45.656408 mkfs.ext4[1156]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 9 19:52:45.656408 mkfs.ext4[1156]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 9 19:52:45.656408 mkfs.ext4[1156]: Filesystem UUID: 05807467-ba2d-47b5-886e-9202d7ce4251 Feb 9 19:52:45.656408 mkfs.ext4[1156]: Superblock backups stored on blocks: Feb 9 19:52:45.656408 mkfs.ext4[1156]: 32768, 98304, 163840, 229376 Feb 9 19:52:45.656408 mkfs.ext4[1156]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:52:45.656408 mkfs.ext4[1156]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:52:45.656408 mkfs.ext4[1156]: Creating journal (8192 blocks): done Feb 9 19:52:45.656408 mkfs.ext4[1156]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:52:45.662187 update_engine[1143]: I0209 19:52:45.655926 1143 main.cc:92] Flatcar Update Engine starting Feb 9 19:52:45.662187 update_engine[1143]: I0209 19:52:45.661940 1143 update_check_scheduler.cc:74] Next update check in 3m46s Feb 9 19:52:45.480366 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:52:45.575313 systemd[1]: Started dbus.service. Feb 9 19:52:45.597495 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:52:45.674503 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 9 19:52:45.704159 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:52:45.597554 systemd[1]: Reached target system-config.target. Feb 9 19:52:45.704464 umount[1168]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 9 19:52:45.704954 tar[1149]: crictl Feb 9 19:52:45.606286 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:52:45.606329 systemd[1]: Reached target user-config.target. Feb 9 19:52:45.708332 extend-filesystems[1165]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 19:52:45.708332 extend-filesystems[1165]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 9 19:52:45.708332 extend-filesystems[1165]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 9 19:52:45.766362 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:52:45.623637 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:52:45.766710 extend-filesystems[1119]: Resized filesystem in /dev/sda9 Feb 9 19:52:45.661886 systemd[1]: Started update-engine.service. Feb 9 19:52:45.677959 systemd[1]: Started locksmithd.service. Feb 9 19:52:45.709016 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:52:45.709308 systemd[1]: Finished extend-filesystems.service. Feb 9 19:52:45.781064 bash[1186]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:52:45.782112 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:52:45.854177 env[1154]: time="2024-02-09T19:52:45.854032214Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:52:45.934437 systemd-logind[1141]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:52:45.934488 systemd-logind[1141]: Watching system buttons on /dev/input/event3 (Sleep Button) Feb 9 19:52:45.934517 systemd-logind[1141]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:52:45.943687 systemd-logind[1141]: New seat seat0. Feb 9 19:52:45.965324 systemd[1]: Started systemd-logind.service. Feb 9 19:52:46.028671 tar[1148]: ./static Feb 9 19:52:46.123215 coreos-metadata[1116]: Feb 09 19:52:46.121 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 9 19:52:46.127631 coreos-metadata[1116]: Feb 09 19:52:46.127 INFO Fetch failed with 404: resource not found Feb 9 19:52:46.127951 coreos-metadata[1116]: Feb 09 19:52:46.127 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 9 19:52:46.133296 coreos-metadata[1116]: Feb 09 19:52:46.133 INFO Fetch successful Feb 9 19:52:46.133535 coreos-metadata[1116]: Feb 09 19:52:46.133 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 9 19:52:46.134311 coreos-metadata[1116]: Feb 09 19:52:46.134 INFO Fetch failed with 404: resource not found Feb 9 19:52:46.134533 coreos-metadata[1116]: Feb 09 19:52:46.134 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 9 19:52:46.136327 coreos-metadata[1116]: Feb 09 19:52:46.136 INFO Fetch failed with 404: resource not found Feb 9 19:52:46.136759 coreos-metadata[1116]: Feb 09 19:52:46.136 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 9 19:52:46.141021 coreos-metadata[1116]: Feb 09 19:52:46.139 INFO Fetch successful Feb 9 19:52:46.143942 unknown[1116]: wrote ssh authorized keys file for user: core Feb 9 19:52:46.191797 env[1154]: time="2024-02-09T19:52:46.191742940Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:52:46.193379 update-ssh-keys[1196]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:52:46.194591 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:52:46.202349 env[1154]: time="2024-02-09T19:52:46.202308192Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:52:46.215675 env[1154]: time="2024-02-09T19:52:46.215615395Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:52:46.217158 env[1154]: time="2024-02-09T19:52:46.217117704Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:52:46.217687 env[1154]: time="2024-02-09T19:52:46.217649216Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:52:46.220461 env[1154]: time="2024-02-09T19:52:46.220428319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:52:46.220598 env[1154]: time="2024-02-09T19:52:46.220574489Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:52:46.220683 env[1154]: time="2024-02-09T19:52:46.220663181Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:52:46.221247 env[1154]: time="2024-02-09T19:52:46.221218992Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:52:46.221736 env[1154]: time="2024-02-09T19:52:46.221704466Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:52:46.223405 env[1154]: time="2024-02-09T19:52:46.223368485Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:52:46.223523 env[1154]: time="2024-02-09T19:52:46.223502749Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:52:46.223707 env[1154]: time="2024-02-09T19:52:46.223682218Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:52:46.223847 env[1154]: time="2024-02-09T19:52:46.223819336Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:52:46.230030 env[1154]: time="2024-02-09T19:52:46.229997118Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:52:46.230204 env[1154]: time="2024-02-09T19:52:46.230179166Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:52:46.230316 env[1154]: time="2024-02-09T19:52:46.230294807Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:52:46.230462 env[1154]: time="2024-02-09T19:52:46.230442414Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.230627 env[1154]: time="2024-02-09T19:52:46.230605798Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.230738 env[1154]: time="2024-02-09T19:52:46.230718182Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.230831 env[1154]: time="2024-02-09T19:52:46.230813759Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.230920 env[1154]: time="2024-02-09T19:52:46.230900162Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.231019 env[1154]: time="2024-02-09T19:52:46.231000843Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.231159 env[1154]: time="2024-02-09T19:52:46.231137037Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.231270 env[1154]: time="2024-02-09T19:52:46.231252706Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.231361 env[1154]: time="2024-02-09T19:52:46.231342711Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:52:46.231624 env[1154]: time="2024-02-09T19:52:46.231593840Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:52:46.231892 env[1154]: time="2024-02-09T19:52:46.231867782Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:52:46.232558 env[1154]: time="2024-02-09T19:52:46.232527036Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:52:46.232725 env[1154]: time="2024-02-09T19:52:46.232701598Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.232833 env[1154]: time="2024-02-09T19:52:46.232812640Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:52:46.233003 env[1154]: time="2024-02-09T19:52:46.232978649Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.233223 env[1154]: time="2024-02-09T19:52:46.233198491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.235194 env[1154]: time="2024-02-09T19:52:46.233629974Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.234460 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:52:46.234064 dbus-daemon[1117]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:52:46.235158 dbus-daemon[1117]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1173 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:52:46.235560 env[1154]: time="2024-02-09T19:52:46.235535146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.235764 env[1154]: time="2024-02-09T19:52:46.235737449Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.235913 env[1154]: time="2024-02-09T19:52:46.235889344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.236060 env[1154]: time="2024-02-09T19:52:46.236036721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.236208 env[1154]: time="2024-02-09T19:52:46.236183745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.236360 env[1154]: time="2024-02-09T19:52:46.236338484Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:52:46.236647 env[1154]: time="2024-02-09T19:52:46.236624092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.236801 env[1154]: time="2024-02-09T19:52:46.236778677Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.236925 env[1154]: time="2024-02-09T19:52:46.236904891Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.237049 env[1154]: time="2024-02-09T19:52:46.237031522Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:52:46.237193 env[1154]: time="2024-02-09T19:52:46.237166596Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:52:46.237312 env[1154]: time="2024-02-09T19:52:46.237292160Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:52:46.237452 env[1154]: time="2024-02-09T19:52:46.237430040Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:52:46.237611 env[1154]: time="2024-02-09T19:52:46.237590940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:52:46.238211 env[1154]: time="2024-02-09T19:52:46.238107253Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:52:46.248708 systemd[1]: Starting polkit.service... Feb 9 19:52:46.268238 env[1154]: time="2024-02-09T19:52:46.268198322Z" level=info msg="Connect containerd service" Feb 9 19:52:46.270842 env[1154]: time="2024-02-09T19:52:46.270809365Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:52:46.272195 env[1154]: time="2024-02-09T19:52:46.272135807Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:52:46.280280 env[1154]: time="2024-02-09T19:52:46.280218217Z" level=info msg="Start subscribing containerd event" Feb 9 19:52:46.281057 env[1154]: time="2024-02-09T19:52:46.281016461Z" level=info msg="Start recovering state" Feb 9 19:52:46.281343 env[1154]: time="2024-02-09T19:52:46.281314874Z" level=info msg="Start event monitor" Feb 9 19:52:46.281490 env[1154]: time="2024-02-09T19:52:46.281464928Z" level=info msg="Start snapshots syncer" Feb 9 19:52:46.281645 env[1154]: time="2024-02-09T19:52:46.281626830Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:52:46.281771 env[1154]: time="2024-02-09T19:52:46.281752904Z" level=info msg="Start streaming server" Feb 9 19:52:46.282616 env[1154]: time="2024-02-09T19:52:46.282588399Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:52:46.284566 env[1154]: time="2024-02-09T19:52:46.284541936Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:52:46.320130 tar[1148]: ./vlan Feb 9 19:52:46.343732 systemd[1]: Started containerd.service. Feb 9 19:52:46.351194 env[1154]: time="2024-02-09T19:52:46.351139837Z" level=info msg="containerd successfully booted in 0.530224s" Feb 9 19:52:46.387588 polkitd[1198]: Started polkitd version 121 Feb 9 19:52:46.415235 polkitd[1198]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:52:46.415333 polkitd[1198]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:52:46.423995 polkitd[1198]: Finished loading, compiling and executing 2 rules Feb 9 19:52:46.424670 dbus-daemon[1117]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:52:46.424885 systemd[1]: Started polkit.service. Feb 9 19:52:46.425526 polkitd[1198]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:52:46.454511 systemd-hostnamed[1173]: Hostname set to (transient) Feb 9 19:52:46.457526 systemd-resolved[1084]: System hostname changed to 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal'. Feb 9 19:52:46.528025 tar[1148]: ./portmap Feb 9 19:52:46.651242 tar[1148]: ./host-local Feb 9 19:52:46.754768 tar[1148]: ./vrf Feb 9 19:52:46.883021 tar[1148]: ./bridge Feb 9 19:52:46.889749 systemd[1]: Finished prepare-critools.service. Feb 9 19:52:47.004985 tar[1148]: ./tuning Feb 9 19:52:47.096030 tar[1148]: ./firewall Feb 9 19:52:47.212125 tar[1148]: ./host-device Feb 9 19:52:47.312561 tar[1148]: ./sbr Feb 9 19:52:47.407186 tar[1148]: ./loopback Feb 9 19:52:47.467152 tar[1150]: linux-amd64/LICENSE Feb 9 19:52:47.471737 tar[1150]: linux-amd64/README.md Feb 9 19:52:47.486804 systemd[1]: Finished prepare-helm.service. Feb 9 19:52:47.495624 tar[1148]: ./dhcp Feb 9 19:52:47.743983 tar[1148]: ./ptp Feb 9 19:52:47.859587 tar[1148]: ./ipvlan Feb 9 19:52:47.957856 tar[1148]: ./bandwidth Feb 9 19:52:48.045162 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:52:48.268233 sshd_keygen[1144]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:52:48.309566 systemd[1]: Finished sshd-keygen.service. Feb 9 19:52:48.318678 systemd[1]: Starting issuegen.service... Feb 9 19:52:48.328880 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:52:48.329136 systemd[1]: Finished issuegen.service. Feb 9 19:52:48.339138 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:52:48.352286 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:52:48.362560 systemd[1]: Started getty@tty1.service. Feb 9 19:52:48.374531 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:52:48.383527 systemd[1]: Reached target getty.target. Feb 9 19:52:48.452779 locksmithd[1185]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:52:51.037295 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 9 19:52:53.143202 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:52:53.166114 systemd-nspawn[1227]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 9 19:52:53.166114 systemd-nspawn[1227]: Press ^] three times within 1s to kill container. Feb 9 19:52:53.179108 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:52:53.264489 systemd[1]: Started oem-gce.service. Feb 9 19:52:53.271681 systemd[1]: Reached target multi-user.target. Feb 9 19:52:53.282234 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:52:53.294580 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:52:53.294836 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:52:53.304395 systemd[1]: Startup finished in 1.034s (kernel) + 8.952s (initrd) + 15.527s (userspace) = 25.515s. Feb 9 19:52:53.359371 systemd-nspawn[1227]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 9 19:52:53.359371 systemd-nspawn[1227]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 9 19:52:53.359607 systemd-nspawn[1227]: + /usr/bin/google_instance_setup Feb 9 19:52:54.016540 instance-setup[1233]: INFO Running google_set_multiqueue. Feb 9 19:52:54.033171 systemd[1]: Created slice system-sshd.slice. Feb 9 19:52:54.034826 instance-setup[1233]: INFO Set channels for eth0 to 2. Feb 9 19:52:54.035096 systemd[1]: Started sshd@0-10.128.0.37:22-147.75.109.163:55294.service. Feb 9 19:52:54.041437 instance-setup[1233]: INFO Setting /proc/irq/27/smp_affinity_list to 0 for device virtio1. Feb 9 19:52:54.043192 instance-setup[1233]: INFO /proc/irq/27/smp_affinity_list: real affinity 0 Feb 9 19:52:54.044097 instance-setup[1233]: INFO Setting /proc/irq/28/smp_affinity_list to 0 for device virtio1. Feb 9 19:52:54.046316 instance-setup[1233]: INFO /proc/irq/28/smp_affinity_list: real affinity 0 Feb 9 19:52:54.047201 instance-setup[1233]: INFO Setting /proc/irq/29/smp_affinity_list to 1 for device virtio1. Feb 9 19:52:54.049291 instance-setup[1233]: INFO /proc/irq/29/smp_affinity_list: real affinity 1 Feb 9 19:52:54.049823 instance-setup[1233]: INFO Setting /proc/irq/30/smp_affinity_list to 1 for device virtio1. Feb 9 19:52:54.051665 instance-setup[1233]: INFO /proc/irq/30/smp_affinity_list: real affinity 1 Feb 9 19:52:54.071866 instance-setup[1233]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 9 19:52:54.072037 instance-setup[1233]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 9 19:52:54.114590 systemd-nspawn[1227]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 9 19:52:54.359531 sshd[1252]: Accepted publickey for core from 147.75.109.163 port 55294 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:54.362725 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:54.382749 systemd[1]: Created slice user-500.slice. Feb 9 19:52:54.386614 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:52:54.403514 systemd-logind[1141]: New session 1 of user core. Feb 9 19:52:54.412534 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:52:54.416575 systemd[1]: Starting user@500.service... Feb 9 19:52:54.436756 (systemd)[1271]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:54.508450 startup-script[1267]: INFO Starting startup scripts. Feb 9 19:52:54.524411 startup-script[1267]: INFO No startup scripts found in metadata. Feb 9 19:52:54.524585 startup-script[1267]: INFO Finished running startup scripts. Feb 9 19:52:54.566342 systemd-nspawn[1227]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 9 19:52:54.566887 systemd-nspawn[1227]: + daemon_pids=() Feb 9 19:52:54.566887 systemd-nspawn[1227]: + for d in accounts clock_skew network Feb 9 19:52:54.566887 systemd-nspawn[1227]: + daemon_pids+=($!) Feb 9 19:52:54.567061 systemd-nspawn[1227]: + for d in accounts clock_skew network Feb 9 19:52:54.567311 systemd-nspawn[1227]: + daemon_pids+=($!) Feb 9 19:52:54.567428 systemd-nspawn[1227]: + for d in accounts clock_skew network Feb 9 19:52:54.567713 systemd-nspawn[1227]: + daemon_pids+=($!) Feb 9 19:52:54.567856 systemd-nspawn[1227]: + NOTIFY_SOCKET=/run/systemd/notify Feb 9 19:52:54.567934 systemd-nspawn[1227]: + /usr/bin/systemd-notify --ready Feb 9 19:52:54.568495 systemd-nspawn[1227]: + /usr/bin/google_network_daemon Feb 9 19:52:54.569212 systemd-nspawn[1227]: + /usr/bin/google_clock_skew_daemon Feb 9 19:52:54.576250 systemd-nspawn[1227]: + /usr/bin/google_accounts_daemon Feb 9 19:52:54.593251 systemd[1271]: Queued start job for default target default.target. Feb 9 19:52:54.594113 systemd[1271]: Reached target paths.target. Feb 9 19:52:54.594146 systemd[1271]: Reached target sockets.target. Feb 9 19:52:54.594168 systemd[1271]: Reached target timers.target. Feb 9 19:52:54.594189 systemd[1271]: Reached target basic.target. Feb 9 19:52:54.594264 systemd[1271]: Reached target default.target. Feb 9 19:52:54.594315 systemd[1271]: Startup finished in 146ms. Feb 9 19:52:54.594358 systemd[1]: Started user@500.service. Feb 9 19:52:54.596025 systemd[1]: Started session-1.scope. Feb 9 19:52:54.636965 systemd-nspawn[1227]: + wait -n 36 37 38 Feb 9 19:52:54.821557 systemd[1]: Started sshd@1-10.128.0.37:22-147.75.109.163:37156.service. Feb 9 19:52:55.137580 sshd[1284]: Accepted publickey for core from 147.75.109.163 port 37156 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:55.139042 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:55.147107 systemd[1]: Started session-2.scope. Feb 9 19:52:55.147710 systemd-logind[1141]: New session 2 of user core. Feb 9 19:52:55.318869 google-networking[1279]: INFO Starting Google Networking daemon. Feb 9 19:52:55.359314 sshd[1284]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:55.363361 systemd[1]: sshd@1-10.128.0.37:22-147.75.109.163:37156.service: Deactivated successfully. Feb 9 19:52:55.364530 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:52:55.366580 systemd-logind[1141]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:52:55.368131 systemd-logind[1141]: Removed session 2. Feb 9 19:52:55.402339 google-clock-skew[1278]: INFO Starting Google Clock Skew daemon. Feb 9 19:52:55.404588 systemd[1]: Started sshd@2-10.128.0.37:22-147.75.109.163:37158.service. Feb 9 19:52:55.425822 google-clock-skew[1278]: INFO Clock drift token has changed: 0. Feb 9 19:52:55.430755 systemd-nspawn[1227]: hwclock: Cannot access the Hardware Clock via any known method. Feb 9 19:52:55.431101 systemd-nspawn[1227]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 9 19:52:55.432016 google-clock-skew[1278]: WARNING Failed to sync system time with hardware clock. Feb 9 19:52:55.473121 groupadd[1300]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 9 19:52:55.477294 groupadd[1300]: group added to /etc/gshadow: name=google-sudoers Feb 9 19:52:55.482139 groupadd[1300]: new group: name=google-sudoers, GID=1000 Feb 9 19:52:55.495477 google-accounts[1277]: INFO Starting Google Accounts daemon. Feb 9 19:52:55.521614 google-accounts[1277]: WARNING OS Login not installed. Feb 9 19:52:55.522612 google-accounts[1277]: INFO Creating a new user account for 0. Feb 9 19:52:55.528983 systemd-nspawn[1227]: useradd: invalid user name '0': use --badname to ignore Feb 9 19:52:55.529725 google-accounts[1277]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 9 19:52:55.695377 sshd[1297]: Accepted publickey for core from 147.75.109.163 port 37158 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:55.696612 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:55.703148 systemd[1]: Started session-3.scope. Feb 9 19:52:55.703722 systemd-logind[1141]: New session 3 of user core. Feb 9 19:52:55.901581 sshd[1297]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:55.905890 systemd[1]: sshd@2-10.128.0.37:22-147.75.109.163:37158.service: Deactivated successfully. Feb 9 19:52:55.907029 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:52:55.907982 systemd-logind[1141]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:52:55.909283 systemd-logind[1141]: Removed session 3. Feb 9 19:52:55.947180 systemd[1]: Started sshd@3-10.128.0.37:22-147.75.109.163:37170.service. Feb 9 19:52:56.229444 sshd[1314]: Accepted publickey for core from 147.75.109.163 port 37170 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:56.231326 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:56.237901 systemd[1]: Started session-4.scope. Feb 9 19:52:56.238732 systemd-logind[1141]: New session 4 of user core. Feb 9 19:52:56.442815 sshd[1314]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:56.446752 systemd[1]: sshd@3-10.128.0.37:22-147.75.109.163:37170.service: Deactivated successfully. Feb 9 19:52:56.447819 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:52:56.448685 systemd-logind[1141]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:52:56.449863 systemd-logind[1141]: Removed session 4. Feb 9 19:52:56.488456 systemd[1]: Started sshd@4-10.128.0.37:22-147.75.109.163:37172.service. Feb 9 19:52:56.772484 sshd[1320]: Accepted publickey for core from 147.75.109.163 port 37172 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:56.774322 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:56.780812 systemd[1]: Started session-5.scope. Feb 9 19:52:56.781611 systemd-logind[1141]: New session 5 of user core. Feb 9 19:52:56.967979 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:52:56.968410 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:52:56.977320 dbus-daemon[1117]: \xd0-\xaf$\xa3U: received setenforce notice (enforcing=748624144) Feb 9 19:52:56.979437 sudo[1323]: pam_unix(sudo:session): session closed for user root Feb 9 19:52:57.023661 sshd[1320]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:57.028659 systemd[1]: sshd@4-10.128.0.37:22-147.75.109.163:37172.service: Deactivated successfully. Feb 9 19:52:57.029819 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:52:57.030677 systemd-logind[1141]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:52:57.031946 systemd-logind[1141]: Removed session 5. Feb 9 19:52:57.068480 systemd[1]: Started sshd@5-10.128.0.37:22-147.75.109.163:37176.service. Feb 9 19:52:57.349049 sshd[1327]: Accepted publickey for core from 147.75.109.163 port 37176 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:57.350845 sshd[1327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:57.357385 systemd[1]: Started session-6.scope. Feb 9 19:52:57.357993 systemd-logind[1141]: New session 6 of user core. Feb 9 19:52:57.523929 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:52:57.524316 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:52:57.528519 sudo[1331]: pam_unix(sudo:session): session closed for user root Feb 9 19:52:57.539950 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:52:57.540339 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:52:57.552381 systemd[1]: Stopping audit-rules.service... Feb 9 19:52:57.553000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:52:57.557339 auditctl[1334]: No rules Feb 9 19:52:57.574446 kernel: kauditd_printk_skb: 132 callbacks suppressed Feb 9 19:52:57.574583 kernel: audit: type=1305 audit(1707508377.553:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:52:57.558035 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:52:57.558307 systemd[1]: Stopped audit-rules.service. Feb 9 19:52:57.553000 audit[1334]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe74b4f980 a2=420 a3=0 items=0 ppid=1 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:57.575617 systemd[1]: Starting audit-rules.service... Feb 9 19:52:57.605680 kernel: audit: type=1300 audit(1707508377.553:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe74b4f980 a2=420 a3=0 items=0 ppid=1 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:57.606773 kernel: audit: type=1327 audit(1707508377.553:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:52:57.553000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:52:57.612609 augenrules[1351]: No rules Feb 9 19:52:57.613815 systemd[1]: Finished audit-rules.service. Feb 9 19:52:57.616753 sudo[1330]: pam_unix(sudo:session): session closed for user root Feb 9 19:52:57.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.661622 kernel: audit: type=1131 audit(1707508377.557:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.661768 kernel: audit: type=1130 audit(1707508377.613:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.661820 kernel: audit: type=1106 audit(1707508377.615:170): pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.615000 audit[1330]: USER_END pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.664920 sshd[1327]: pam_unix(sshd:session): session closed for user core Feb 9 19:52:57.669719 systemd-logind[1141]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:52:57.671875 systemd[1]: sshd@5-10.128.0.37:22-147.75.109.163:37176.service: Deactivated successfully. Feb 9 19:52:57.672975 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:52:57.675212 systemd-logind[1141]: Removed session 6. Feb 9 19:52:57.615000 audit[1330]: CRED_DISP pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.687148 kernel: audit: type=1104 audit(1707508377.615:171): pid=1330 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.708578 systemd[1]: Started sshd@6-10.128.0.37:22-147.75.109.163:37190.service. Feb 9 19:52:57.665000 audit[1327]: USER_END pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:57.665000 audit[1327]: CRED_DISP pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:57.767832 kernel: audit: type=1106 audit(1707508377.665:172): pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:57.767972 kernel: audit: type=1104 audit(1707508377.665:173): pid=1327 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:57.768022 kernel: audit: type=1131 audit(1707508377.671:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.37:22-147.75.109.163:37176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.37:22-147.75.109.163:37176 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.37:22-147.75.109.163:37190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:57.995000 audit[1357]: USER_ACCT pid=1357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:57.997222 sshd[1357]: Accepted publickey for core from 147.75.109.163 port 37190 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:52:57.997000 audit[1357]: CRED_ACQ pid=1357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:57.997000 audit[1357]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2f06d870 a2=3 a3=0 items=0 ppid=1 pid=1357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:57.997000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:52:57.998953 sshd[1357]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:52:58.005316 systemd[1]: Started session-7.scope. Feb 9 19:52:58.006115 systemd-logind[1141]: New session 7 of user core. Feb 9 19:52:58.012000 audit[1357]: USER_START pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:58.014000 audit[1359]: CRED_ACQ pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:52:58.172000 audit[1360]: USER_ACCT pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:58.174022 sudo[1360]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:52:58.173000 audit[1360]: CRED_REFR pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:58.174442 sudo[1360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:52:58.175000 audit[1360]: USER_START pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:52:58.783180 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:52:58.792373 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:52:58.792939 systemd[1]: Reached target network-online.target. Feb 9 19:52:58.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:58.795198 systemd[1]: Starting docker.service... Feb 9 19:52:58.842202 env[1376]: time="2024-02-09T19:52:58.842127277Z" level=info msg="Starting up" Feb 9 19:52:58.845496 env[1376]: time="2024-02-09T19:52:58.845436016Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:52:58.845496 env[1376]: time="2024-02-09T19:52:58.845464407Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:52:58.845496 env[1376]: time="2024-02-09T19:52:58.845491344Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:52:58.845754 env[1376]: time="2024-02-09T19:52:58.845505648Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:52:58.848019 env[1376]: time="2024-02-09T19:52:58.847994565Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 9 19:52:58.848178 env[1376]: time="2024-02-09T19:52:58.848159276Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 9 19:52:58.848328 env[1376]: time="2024-02-09T19:52:58.848311013Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 9 19:52:58.848395 env[1376]: time="2024-02-09T19:52:58.848382342Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 9 19:52:58.856744 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport128989081-merged.mount: Deactivated successfully. Feb 9 19:52:58.893468 env[1376]: time="2024-02-09T19:52:58.893412728Z" level=info msg="Loading containers: start." Feb 9 19:52:58.961000 audit[1407]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:58.961000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd6105f5d0 a2=0 a3=7ffd6105f5bc items=0 ppid=1376 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:58.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 9 19:52:58.965000 audit[1409]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:58.965000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd9a1d4410 a2=0 a3=7ffd9a1d43fc items=0 ppid=1376 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:58.965000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 9 19:52:58.968000 audit[1411]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:58.968000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffce0299710 a2=0 a3=7ffce02996fc items=0 ppid=1376 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:58.968000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:52:58.971000 audit[1413]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:58.971000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffd6b17510 a2=0 a3=7fffd6b174fc items=0 ppid=1376 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:58.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:52:58.976000 audit[1415]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:58.976000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee516a670 a2=0 a3=7ffee516a65c items=0 ppid=1376 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:58.976000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 9 19:52:58.994000 audit[1420]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:58.994000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc479fcdc0 a2=0 a3=7ffc479fcdac items=0 ppid=1376 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:58.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 9 19:52:59.006000 audit[1422]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.006000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff030c0a40 a2=0 a3=7fff030c0a2c items=0 ppid=1376 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.006000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 9 19:52:59.009000 audit[1424]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.009000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffef35b6c20 a2=0 a3=7ffef35b6c0c items=0 ppid=1376 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 9 19:52:59.012000 audit[1426]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.012000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcd8a21df0 a2=0 a3=7ffcd8a21ddc items=0 ppid=1376 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:52:59.025000 audit[1430]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.025000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2d0262c0 a2=0 a3=7ffd2d0262ac items=0 ppid=1376 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.025000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:52:59.027000 audit[1431]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.027000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff7fd5ec10 a2=0 a3=7fff7fd5ebfc items=0 ppid=1376 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.027000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:52:59.042310 kernel: Initializing XFRM netlink socket Feb 9 19:52:59.087869 env[1376]: time="2024-02-09T19:52:59.087794910Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 9 19:52:59.122000 audit[1439]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.122000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffcccf7540 a2=0 a3=7fffcccf752c items=0 ppid=1376 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 9 19:52:59.135000 audit[1442]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.135000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffccafc6f40 a2=0 a3=7ffccafc6f2c items=0 ppid=1376 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.135000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 9 19:52:59.139000 audit[1445]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.139000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffc1b15850 a2=0 a3=7fffc1b1583c items=0 ppid=1376 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 9 19:52:59.142000 audit[1447]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.142000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe215ec890 a2=0 a3=7ffe215ec87c items=0 ppid=1376 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 9 19:52:59.145000 audit[1449]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.145000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe8c4e5470 a2=0 a3=7ffe8c4e545c items=0 ppid=1376 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.145000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 9 19:52:59.149000 audit[1451]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.149000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffead6fa9a0 a2=0 a3=7ffead6fa98c items=0 ppid=1376 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.149000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 9 19:52:59.152000 audit[1453]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.152000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffff6e4a30 a2=0 a3=7fffff6e4a1c items=0 ppid=1376 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 9 19:52:59.163000 audit[1456]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.163000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffef9f09930 a2=0 a3=7ffef9f0991c items=0 ppid=1376 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 9 19:52:59.167000 audit[1458]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.167000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcc24c4fd0 a2=0 a3=7ffcc24c4fbc items=0 ppid=1376 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 9 19:52:59.170000 audit[1460]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.170000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcb7b7c9e0 a2=0 a3=7ffcb7b7c9cc items=0 ppid=1376 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 9 19:52:59.173000 audit[1462]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.173000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff37938f40 a2=0 a3=7fff37938f2c items=0 ppid=1376 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.173000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 9 19:52:59.175548 systemd-networkd[1034]: docker0: Link UP Feb 9 19:52:59.188000 audit[1466]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.188000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf6a03f00 a2=0 a3=7ffcf6a03eec items=0 ppid=1376 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:52:59.189000 audit[1467]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:52:59.189000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc6d305060 a2=0 a3=7ffc6d30504c items=0 ppid=1376 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:52:59.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 9 19:52:59.191330 env[1376]: time="2024-02-09T19:52:59.191278135Z" level=info msg="Loading containers: done." Feb 9 19:52:59.205935 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck599711394-merged.mount: Deactivated successfully. Feb 9 19:52:59.215328 env[1376]: time="2024-02-09T19:52:59.215252884Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 9 19:52:59.215608 env[1376]: time="2024-02-09T19:52:59.215575140Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 9 19:52:59.215774 env[1376]: time="2024-02-09T19:52:59.215731848Z" level=info msg="Daemon has completed initialization" Feb 9 19:52:59.237589 systemd[1]: Started docker.service. Feb 9 19:52:59.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:59.247611 env[1376]: time="2024-02-09T19:52:59.247533864Z" level=info msg="API listen on /run/docker.sock" Feb 9 19:52:59.274285 systemd[1]: Reloading. Feb 9 19:52:59.376050 /usr/lib/systemd/system-generators/torcx-generator[1514]: time="2024-02-09T19:52:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:52:59.388819 /usr/lib/systemd/system-generators/torcx-generator[1514]: time="2024-02-09T19:52:59Z" level=info msg="torcx already run" Feb 9 19:52:59.487914 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:52:59.487947 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:52:59.511229 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.601000 audit: BPF prog-id=37 op=LOAD Feb 9 19:52:59.601000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit: BPF prog-id=38 op=LOAD Feb 9 19:52:59.625000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit: BPF prog-id=39 op=LOAD Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.625000 audit: BPF prog-id=40 op=LOAD Feb 9 19:52:59.625000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:52:59.625000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit: BPF prog-id=41 op=LOAD Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.627000 audit: BPF prog-id=42 op=LOAD Feb 9 19:52:59.627000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:52:59.627000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit: BPF prog-id=43 op=LOAD Feb 9 19:52:59.631000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit: BPF prog-id=44 op=LOAD Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit: BPF prog-id=45 op=LOAD Feb 9 19:52:59.631000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:52:59.631000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit: BPF prog-id=46 op=LOAD Feb 9 19:52:59.632000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit: BPF prog-id=47 op=LOAD Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.632000 audit: BPF prog-id=48 op=LOAD Feb 9 19:52:59.632000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:52:59.632000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit: BPF prog-id=49 op=LOAD Feb 9 19:52:59.633000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit: BPF prog-id=50 op=LOAD Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit: BPF prog-id=51 op=LOAD Feb 9 19:52:59.634000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:52:59.634000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.635000 audit: BPF prog-id=52 op=LOAD Feb 9 19:52:59.635000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.638000 audit: BPF prog-id=53 op=LOAD Feb 9 19:52:59.638000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:52:59.639000 audit: BPF prog-id=54 op=LOAD Feb 9 19:52:59.639000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:52:59.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:52:59.654545 systemd[1]: Started kubelet.service. Feb 9 19:52:59.742003 kubelet[1557]: E0209 19:52:59.741929 1557 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:52:59.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:52:59.745202 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:52:59.745419 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:53:00.258180 env[1154]: time="2024-02-09T19:53:00.257785280Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 9 19:53:00.731963 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2167869541.mount: Deactivated successfully. Feb 9 19:53:02.768998 env[1154]: time="2024-02-09T19:53:02.768923115Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:02.771957 env[1154]: time="2024-02-09T19:53:02.771904338Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:02.774369 env[1154]: time="2024-02-09T19:53:02.774320070Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:02.777144 env[1154]: time="2024-02-09T19:53:02.777100119Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:02.778152 env[1154]: time="2024-02-09T19:53:02.778089242Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 9 19:53:02.792933 env[1154]: time="2024-02-09T19:53:02.792869579Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 9 19:53:04.723441 env[1154]: time="2024-02-09T19:53:04.723382238Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:04.727432 env[1154]: time="2024-02-09T19:53:04.727380154Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:04.730067 env[1154]: time="2024-02-09T19:53:04.730027480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:04.732669 env[1154]: time="2024-02-09T19:53:04.732625959Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:04.734101 env[1154]: time="2024-02-09T19:53:04.734034415Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 9 19:53:04.749491 env[1154]: time="2024-02-09T19:53:04.749422640Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 9 19:53:05.940894 env[1154]: time="2024-02-09T19:53:05.940830477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:05.944508 env[1154]: time="2024-02-09T19:53:05.944457559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:05.947421 env[1154]: time="2024-02-09T19:53:05.947375977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:05.950144 env[1154]: time="2024-02-09T19:53:05.950102960Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:05.951134 env[1154]: time="2024-02-09T19:53:05.951062748Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 9 19:53:05.970986 env[1154]: time="2024-02-09T19:53:05.970906230Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:53:06.988010 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount707634213.mount: Deactivated successfully. Feb 9 19:53:07.569906 env[1154]: time="2024-02-09T19:53:07.569826260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.572821 env[1154]: time="2024-02-09T19:53:07.572766987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.575385 env[1154]: time="2024-02-09T19:53:07.575339451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.577570 env[1154]: time="2024-02-09T19:53:07.577532186Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.578199 env[1154]: time="2024-02-09T19:53:07.578148260Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:53:07.592331 env[1154]: time="2024-02-09T19:53:07.592282824Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 9 19:53:07.957730 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2604809452.mount: Deactivated successfully. Feb 9 19:53:07.965103 env[1154]: time="2024-02-09T19:53:07.965030253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.968187 env[1154]: time="2024-02-09T19:53:07.968128375Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.970750 env[1154]: time="2024-02-09T19:53:07.970704885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.973186 env[1154]: time="2024-02-09T19:53:07.973141848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:07.973951 env[1154]: time="2024-02-09T19:53:07.973904661Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 9 19:53:07.987955 env[1154]: time="2024-02-09T19:53:07.987905388Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 9 19:53:08.734325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3836079302.mount: Deactivated successfully. Feb 9 19:53:09.945488 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 9 19:53:09.945819 systemd[1]: Stopped kubelet.service. Feb 9 19:53:09.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:09.953270 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 9 19:53:09.953400 kernel: audit: type=1130 audit(1707508389.944:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:09.976541 systemd[1]: Started kubelet.service. Feb 9 19:53:09.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:09.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:10.021834 kernel: audit: type=1131 audit(1707508389.944:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:10.021994 kernel: audit: type=1130 audit(1707508389.975:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:10.094065 kubelet[1602]: E0209 19:53:10.093996 1602 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:53:10.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:53:10.099996 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:53:10.100226 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:53:10.123122 kernel: audit: type=1131 audit(1707508390.099:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:53:13.353234 env[1154]: time="2024-02-09T19:53:13.353152914Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:13.357746 env[1154]: time="2024-02-09T19:53:13.357681243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:13.361516 env[1154]: time="2024-02-09T19:53:13.361470099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:13.364204 env[1154]: time="2024-02-09T19:53:13.364139597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:13.365381 env[1154]: time="2024-02-09T19:53:13.365333520Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 9 19:53:13.379340 env[1154]: time="2024-02-09T19:53:13.379291036Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 9 19:53:13.798777 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2923624329.mount: Deactivated successfully. Feb 9 19:53:14.467273 env[1154]: time="2024-02-09T19:53:14.467189422Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:14.471050 env[1154]: time="2024-02-09T19:53:14.470978810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:14.473196 env[1154]: time="2024-02-09T19:53:14.473127346Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:14.475777 env[1154]: time="2024-02-09T19:53:14.475708326Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:14.477047 env[1154]: time="2024-02-09T19:53:14.476987539Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 9 19:53:16.487035 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:53:16.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:16.511108 kernel: audit: type=1131 audit(1707508396.486:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:16.526000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:53:16.526000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:53:16.542273 kernel: audit: type=1334 audit(1707508396.526:423): prog-id=40 op=UNLOAD Feb 9 19:53:16.542373 kernel: audit: type=1334 audit(1707508396.526:424): prog-id=39 op=UNLOAD Feb 9 19:53:16.542419 kernel: audit: type=1334 audit(1707508396.526:425): prog-id=38 op=UNLOAD Feb 9 19:53:16.526000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:53:18.309636 systemd[1]: Stopped kubelet.service. Feb 9 19:53:18.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:18.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:18.342258 systemd[1]: Reloading. Feb 9 19:53:18.354005 kernel: audit: type=1130 audit(1707508398.308:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:18.354153 kernel: audit: type=1131 audit(1707508398.308:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:18.462341 /usr/lib/systemd/system-generators/torcx-generator[1692]: time="2024-02-09T19:53:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:53:18.462953 /usr/lib/systemd/system-generators/torcx-generator[1692]: time="2024-02-09T19:53:18Z" level=info msg="torcx already run" Feb 9 19:53:18.548349 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:53:18.548379 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:53:18.573910 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699313 kernel: audit: type=1400 audit(1707508398.677:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.737568 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:53:18.737735 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:53:18.737783 kernel: audit: type=1400 audit(1707508398.677:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.697000 audit: BPF prog-id=55 op=LOAD Feb 9 19:53:18.697000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.699000 audit: BPF prog-id=56 op=LOAD Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.700000 audit: BPF prog-id=57 op=LOAD Feb 9 19:53:18.700000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:53:18.700000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit: BPF prog-id=58 op=LOAD Feb 9 19:53:18.702000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit: BPF prog-id=59 op=LOAD Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.703000 audit: BPF prog-id=60 op=LOAD Feb 9 19:53:18.716000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:53:18.736000 audit: BPF prog-id=61 op=LOAD Feb 9 19:53:18.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:18.771720 systemd[1]: Started kubelet.service. Feb 9 19:53:18.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:18.840119 kubelet[1737]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:53:18.840621 kubelet[1737]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:53:18.840861 kubelet[1737]: I0209 19:53:18.840806 1737 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:53:18.843205 kubelet[1737]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:53:18.843354 kubelet[1737]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:53:19.629521 kubelet[1737]: I0209 19:53:19.629465 1737 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:53:19.629521 kubelet[1737]: I0209 19:53:19.629500 1737 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:53:19.629837 kubelet[1737]: I0209 19:53:19.629813 1737 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:53:19.639644 kubelet[1737]: I0209 19:53:19.639603 1737 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:53:19.640831 kubelet[1737]: E0209 19:53:19.640802 1737 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.641917 kubelet[1737]: I0209 19:53:19.641870 1737 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:53:19.642294 kubelet[1737]: I0209 19:53:19.642259 1737 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:53:19.642392 kubelet[1737]: I0209 19:53:19.642373 1737 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:53:19.642576 kubelet[1737]: I0209 19:53:19.642408 1737 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:53:19.642576 kubelet[1737]: I0209 19:53:19.642428 1737 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:53:19.642576 kubelet[1737]: I0209 19:53:19.642575 1737 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:53:19.646429 kubelet[1737]: I0209 19:53:19.646406 1737 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:53:19.646597 kubelet[1737]: I0209 19:53:19.646581 1737 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:53:19.646724 kubelet[1737]: I0209 19:53:19.646709 1737 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:53:19.646856 kubelet[1737]: I0209 19:53:19.646840 1737 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:53:19.647398 kubelet[1737]: W0209 19:53:19.646889 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.647564 kubelet[1737]: E0209 19:53:19.647548 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.648129 kubelet[1737]: W0209 19:53:19.648069 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.648285 kubelet[1737]: E0209 19:53:19.648267 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.648481 kubelet[1737]: I0209 19:53:19.648464 1737 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:53:19.651262 kubelet[1737]: W0209 19:53:19.651241 1737 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:53:19.651979 kubelet[1737]: I0209 19:53:19.651955 1737 server.go:1186] "Started kubelet" Feb 9 19:53:19.653000 audit[1737]: AVC avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:19.653000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:53:19.654634 kubelet[1737]: E0209 19:53:19.654420 1737 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:53:19.654634 kubelet[1737]: E0209 19:53:19.654454 1737 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:53:19.653000 audit[1737]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dbd320 a1=c000a67ed8 a2=c000dbd2f0 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.655008 kubelet[1737]: E0209 19:53:19.654704 1737 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal.17b249d7bc3faeef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", UID:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 53, 19, 651925743, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 53, 19, 651925743, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.37:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.37:6443: connect: connection refused'(may retry after sleeping) Feb 9 19:53:19.653000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:53:19.655443 kubelet[1737]: I0209 19:53:19.655425 1737 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:53:19.654000 audit[1737]: AVC avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:19.654000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:53:19.654000 audit[1737]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008db200 a1=c000a67ef0 a2=c000dbd3b0 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.654000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:53:19.656171 kubelet[1737]: I0209 19:53:19.656146 1737 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:53:19.656365 kubelet[1737]: I0209 19:53:19.656348 1737 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:53:19.660343 kubelet[1737]: I0209 19:53:19.660319 1737 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:53:19.661104 kubelet[1737]: I0209 19:53:19.661033 1737 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:53:19.665033 kubelet[1737]: I0209 19:53:19.664061 1737 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:53:19.665033 kubelet[1737]: I0209 19:53:19.664171 1737 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:53:19.665033 kubelet[1737]: W0209 19:53:19.664585 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.665033 kubelet[1737]: E0209 19:53:19.664635 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.665328 kubelet[1737]: E0209 19:53:19.665066 1737 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.128.0.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.668000 audit[1747]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.668000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdfdc032d0 a2=0 a3=7ffdfdc032bc items=0 ppid=1737 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:53:19.673000 audit[1749]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.673000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa18e1a90 a2=0 a3=7fffa18e1a7c items=0 ppid=1737 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.673000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:53:19.691000 audit[1752]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.691000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe1114500 a2=0 a3=7fffe11144ec items=0 ppid=1737 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:53:19.700000 audit[1755]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.700000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc729b9b10 a2=0 a3=7ffc729b9afc items=0 ppid=1737 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:53:19.715963 kubelet[1737]: I0209 19:53:19.715934 1737 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:53:19.716247 kubelet[1737]: I0209 19:53:19.716228 1737 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:53:19.716379 kubelet[1737]: I0209 19:53:19.716364 1737 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:53:19.717000 audit[1758]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.717000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffee93b9870 a2=0 a3=7ffee93b985c items=0 ppid=1737 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:53:19.719000 audit[1760]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.719000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed4910f50 a2=0 a3=7ffed4910f3c items=0 ppid=1737 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:53:19.726000 audit[1763]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.726000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff76997180 a2=0 a3=7fff7699716c items=0 ppid=1737 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:53:19.731000 audit[1766]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.731000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffd54f8cba0 a2=0 a3=7ffd54f8cb8c items=0 ppid=1737 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:53:19.734000 audit[1767]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.734000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffc1c73380 a2=0 a3=7fffc1c7336c items=0 ppid=1737 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:53:19.735000 audit[1768]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.735000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff50885a50 a2=0 a3=7fff50885a3c items=0 ppid=1737 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:53:19.739000 audit[1770]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.739000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffcca6b900 a2=0 a3=7fffcca6b8ec items=0 ppid=1737 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:53:19.742000 audit[1772]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.742000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff117c7890 a2=0 a3=7fff117c787c items=0 ppid=1737 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:53:19.746000 audit[1774]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.746000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffeae17a0c0 a2=0 a3=7ffeae17a0ac items=0 ppid=1737 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:53:19.749000 audit[1776]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.749000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffe454a90d0 a2=0 a3=7ffe454a90bc items=0 ppid=1737 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:53:19.753000 audit[1778]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.753000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff1f6e8190 a2=0 a3=7fff1f6e817c items=0 ppid=1737 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:53:19.754627 kubelet[1737]: I0209 19:53:19.754602 1737 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:53:19.755000 audit[1779]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.755000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe39b241f0 a2=0 a3=7ffe39b241dc items=0 ppid=1737 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.755000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:53:19.755000 audit[1780]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.755000 audit[1780]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe10bde2b0 a2=0 a3=7ffe10bde29c items=0 ppid=1737 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:53:19.758000 audit[1781]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.758000 audit[1782]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.758000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2d2042c0 a2=0 a3=7ffe2d2042ac items=0 ppid=1737 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:53:19.758000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff4a668850 a2=0 a3=7fff4a66883c items=0 ppid=1737 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:53:19.760000 audit[1783]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:19.760000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff001afe00 a2=0 a3=7fff001afdec items=0 ppid=1737 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:53:19.762000 audit[1785]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.762000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcdcd0cbc0 a2=0 a3=7ffcdcd0cbac items=0 ppid=1737 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.762000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:53:19.764000 audit[1786]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.764000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc7cf3d080 a2=0 a3=7ffc7cf3d06c items=0 ppid=1737 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.764000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:53:19.767000 audit[1788]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.767000 audit[1788]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffff15de480 a2=0 a3=7ffff15de46c items=0 ppid=1737 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.768999 kubelet[1737]: I0209 19:53:19.768903 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:19.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:53:19.769498 kubelet[1737]: E0209 19:53:19.769475 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.37:6443/api/v1/nodes\": dial tcp 10.128.0.37:6443: connect: connection refused" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:19.769000 audit[1789]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.769000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc6d68e6c0 a2=0 a3=7ffc6d68e6ac items=0 ppid=1737 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:53:19.771000 audit[1790]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.771000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8e8bd830 a2=0 a3=7ffe8e8bd81c items=0 ppid=1737 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.771000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:53:19.774000 audit[1792]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.774000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2b8554b0 a2=0 a3=7ffd2b85549c items=0 ppid=1737 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:53:19.777000 audit[1794]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.777000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd3d6b610 a2=0 a3=7fffd3d6b5fc items=0 ppid=1737 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:53:19.781000 audit[1796]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.781000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffd83e68f90 a2=0 a3=7ffd83e68f7c items=0 ppid=1737 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:53:19.784000 audit[1798]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.784000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffdd89a6c00 a2=0 a3=7ffdd89a6bec items=0 ppid=1737 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:53:19.788000 audit[1800]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.788000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffc3c2fe980 a2=0 a3=7ffc3c2fe96c items=0 ppid=1737 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:53:19.791000 audit[1801]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.791000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce97f97e0 a2=0 a3=7ffce97f97cc items=0 ppid=1737 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:53:19.793000 audit[1803]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.793000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1612fe10 a2=0 a3=7ffe1612fdfc items=0 ppid=1737 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:53:19.795000 audit[1804]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1804 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:19.795000 audit[1804]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9625aa90 a2=0 a3=7ffe9625aa7c items=0 ppid=1737 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.795000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:53:19.815396 kubelet[1737]: I0209 19:53:19.790593 1737 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:53:19.815396 kubelet[1737]: I0209 19:53:19.790633 1737 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:53:19.815396 kubelet[1737]: I0209 19:53:19.790663 1737 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:53:19.815396 kubelet[1737]: E0209 19:53:19.790730 1737 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 19:53:19.815396 kubelet[1737]: W0209 19:53:19.792192 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.815396 kubelet[1737]: E0209 19:53:19.792259 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.823356 kubelet[1737]: I0209 19:53:19.823314 1737 policy_none.go:49] "None policy: Start" Feb 9 19:53:19.824444 kubelet[1737]: I0209 19:53:19.824417 1737 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:53:19.824571 kubelet[1737]: I0209 19:53:19.824453 1737 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:53:19.865633 kubelet[1737]: E0209 19:53:19.865564 1737 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.128.0.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:19.895057 kubelet[1737]: E0209 19:53:19.890839 1737 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 19:53:19.904606 systemd[1]: Created slice kubepods.slice. Feb 9 19:53:19.912027 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:53:19.916784 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:53:19.923098 kubelet[1737]: I0209 19:53:19.923044 1737 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:53:19.922000 audit[1737]: AVC avc: denied { mac_admin } for pid=1737 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:19.922000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:53:19.922000 audit[1737]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000edc810 a1=c000a67f38 a2=c000edc7e0 a3=25 items=0 ppid=1 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:19.922000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:53:19.923636 kubelet[1737]: I0209 19:53:19.923189 1737 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:53:19.923636 kubelet[1737]: I0209 19:53:19.923455 1737 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:53:19.925564 kubelet[1737]: E0209 19:53:19.925523 1737 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" not found" Feb 9 19:53:19.974805 kubelet[1737]: I0209 19:53:19.974765 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:19.975258 kubelet[1737]: E0209 19:53:19.975216 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.37:6443/api/v1/nodes\": dial tcp 10.128.0.37:6443: connect: connection refused" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.092013 kubelet[1737]: I0209 19:53:20.091951 1737 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:20.099645 kubelet[1737]: I0209 19:53:20.099612 1737 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:20.104223 kubelet[1737]: I0209 19:53:20.104191 1737 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:20.106193 kubelet[1737]: I0209 19:53:20.106166 1737 status_manager.go:698] "Failed to get status for pod" podUID=8d46fed125f6375e48d891ca2843da0d pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" err="Get \"https://10.128.0.37:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\": dial tcp 10.128.0.37:6443: connect: connection refused" Feb 9 19:53:20.157690 kubelet[1737]: I0209 19:53:20.112374 1737 status_manager.go:698] "Failed to get status for pod" podUID=9e2e5973323e9fef9d2f4b3abb0245a0 pod="kube-system/kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" err="Get \"https://10.128.0.37:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\": dial tcp 10.128.0.37:6443: connect: connection refused" Feb 9 19:53:20.157690 kubelet[1737]: I0209 19:53:20.120371 1737 status_manager.go:698] "Failed to get status for pod" podUID=96111b8ee155beabad6d24e3bb52833c pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" err="Get \"https://10.128.0.37:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\": dial tcp 10.128.0.37:6443: connect: connection refused" Feb 9 19:53:20.112543 systemd[1]: Created slice kubepods-burstable-pod8d46fed125f6375e48d891ca2843da0d.slice. Feb 9 19:53:20.126268 systemd[1]: Created slice kubepods-burstable-pod9e2e5973323e9fef9d2f4b3abb0245a0.slice. Feb 9 19:53:20.132457 systemd[1]: Created slice kubepods-burstable-pod96111b8ee155beabad6d24e3bb52833c.slice. Feb 9 19:53:20.171914 kubelet[1737]: I0209 19:53:20.171864 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9e2e5973323e9fef9d2f4b3abb0245a0-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"9e2e5973323e9fef9d2f4b3abb0245a0\") " pod="kube-system/kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172141 kubelet[1737]: I0209 19:53:20.171948 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/96111b8ee155beabad6d24e3bb52833c-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"96111b8ee155beabad6d24e3bb52833c\") " pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172141 kubelet[1737]: I0209 19:53:20.171994 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/96111b8ee155beabad6d24e3bb52833c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"96111b8ee155beabad6d24e3bb52833c\") " pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172141 kubelet[1737]: I0209 19:53:20.172033 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172141 kubelet[1737]: I0209 19:53:20.172089 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172401 kubelet[1737]: I0209 19:53:20.172155 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172401 kubelet[1737]: I0209 19:53:20.172197 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/96111b8ee155beabad6d24e3bb52833c-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"96111b8ee155beabad6d24e3bb52833c\") " pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172401 kubelet[1737]: I0209 19:53:20.172240 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.172401 kubelet[1737]: I0209 19:53:20.172283 1737 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.266601 kubelet[1737]: E0209 19:53:20.266541 1737 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.128.0.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:20.380559 kubelet[1737]: I0209 19:53:20.380527 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.381252 kubelet[1737]: E0209 19:53:20.381222 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.37:6443/api/v1/nodes\": dial tcp 10.128.0.37:6443: connect: connection refused" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:20.423872 env[1154]: time="2024-02-09T19:53:20.423444283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal,Uid:8d46fed125f6375e48d891ca2843da0d,Namespace:kube-system,Attempt:0,}" Feb 9 19:53:20.431619 env[1154]: time="2024-02-09T19:53:20.431549937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal,Uid:9e2e5973323e9fef9d2f4b3abb0245a0,Namespace:kube-system,Attempt:0,}" Feb 9 19:53:20.436434 env[1154]: time="2024-02-09T19:53:20.436386857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal,Uid:96111b8ee155beabad6d24e3bb52833c,Namespace:kube-system,Attempt:0,}" Feb 9 19:53:20.581324 kubelet[1737]: W0209 19:53:20.581234 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:20.581324 kubelet[1737]: E0209 19:53:20.581309 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:20.967443 kubelet[1737]: W0209 19:53:20.967362 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:20.967443 kubelet[1737]: E0209 19:53:20.967451 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.067097 kubelet[1737]: E0209 19:53:21.067030 1737 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.128.0.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.188699 kubelet[1737]: I0209 19:53:21.188660 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:21.189111 kubelet[1737]: E0209 19:53:21.189056 1737 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.37:6443/api/v1/nodes\": dial tcp 10.128.0.37:6443: connect: connection refused" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:21.233996 kubelet[1737]: W0209 19:53:21.233789 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.233996 kubelet[1737]: E0209 19:53:21.233879 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.239445 kubelet[1737]: W0209 19:53:21.239316 1737 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.239445 kubelet[1737]: E0209 19:53:21.239411 1737 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.256746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount841844610.mount: Deactivated successfully. Feb 9 19:53:21.265824 env[1154]: time="2024-02-09T19:53:21.265745943Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.269891 env[1154]: time="2024-02-09T19:53:21.269824370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.272198 env[1154]: time="2024-02-09T19:53:21.272137484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.273378 env[1154]: time="2024-02-09T19:53:21.273327201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.276122 env[1154]: time="2024-02-09T19:53:21.276024781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.277861 env[1154]: time="2024-02-09T19:53:21.277802902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.281029 env[1154]: time="2024-02-09T19:53:21.280972726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.282287 env[1154]: time="2024-02-09T19:53:21.282238872Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.283436 env[1154]: time="2024-02-09T19:53:21.283402372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.285533 env[1154]: time="2024-02-09T19:53:21.285483089Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.289929 env[1154]: time="2024-02-09T19:53:21.289872015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.300811 env[1154]: time="2024-02-09T19:53:21.300745312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:21.326392 env[1154]: time="2024-02-09T19:53:21.323848309Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:21.326392 env[1154]: time="2024-02-09T19:53:21.323896888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:21.326392 env[1154]: time="2024-02-09T19:53:21.323915089Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:21.327965 env[1154]: time="2024-02-09T19:53:21.327850824Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef0a19a2728b41f106c6942ec0244fef1a69f349a11f1824b5d0c99c57345938 pid=1813 runtime=io.containerd.runc.v2 Feb 9 19:53:21.362217 env[1154]: time="2024-02-09T19:53:21.362096476Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:21.362429 env[1154]: time="2024-02-09T19:53:21.362242016Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:21.362429 env[1154]: time="2024-02-09T19:53:21.362282397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:21.362682 env[1154]: time="2024-02-09T19:53:21.362576015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/266945a066c45bd9099b284f8a74771773004d1fb81746ff81948e942527489b pid=1838 runtime=io.containerd.runc.v2 Feb 9 19:53:21.374333 systemd[1]: Started cri-containerd-ef0a19a2728b41f106c6942ec0244fef1a69f349a11f1824b5d0c99c57345938.scope. Feb 9 19:53:21.384753 env[1154]: time="2024-02-09T19:53:21.384354570Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:21.384753 env[1154]: time="2024-02-09T19:53:21.384431593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:21.384753 env[1154]: time="2024-02-09T19:53:21.384452397Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:21.385118 env[1154]: time="2024-02-09T19:53:21.384734492Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/739d508b1e6b8b652f50457b79369160aea1795c72c5941d4ff15cf909310444 pid=1859 runtime=io.containerd.runc.v2 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.403000 audit: BPF prog-id=70 op=LOAD Feb 9 19:53:21.404000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.404000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1813 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566306131396132373238623431663130366336393432656330323434 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1813 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566306131396132373238623431663130366336393432656330323434 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.405000 audit: BPF prog-id=71 op=LOAD Feb 9 19:53:21.405000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000248f70 items=0 ppid=1813 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566306131396132373238623431663130366336393432656330323434 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.407000 audit: BPF prog-id=72 op=LOAD Feb 9 19:53:21.407000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000248fb8 items=0 ppid=1813 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566306131396132373238623431663130366336393432656330323434 Feb 9 19:53:21.408000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:53:21.408000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { perfmon } for pid=1824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit[1824]: AVC avc: denied { bpf } for pid=1824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.408000 audit: BPF prog-id=73 op=LOAD Feb 9 19:53:21.408000 audit[1824]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002493c8 items=0 ppid=1813 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.408000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566306131396132373238623431663130366336393432656330323434 Feb 9 19:53:21.423705 systemd[1]: Started cri-containerd-266945a066c45bd9099b284f8a74771773004d1fb81746ff81948e942527489b.scope. Feb 9 19:53:21.444106 systemd[1]: Started cri-containerd-739d508b1e6b8b652f50457b79369160aea1795c72c5941d4ff15cf909310444.scope. Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.470000 audit: BPF prog-id=74 op=LOAD Feb 9 19:53:21.472000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.472000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=1838 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363934356130363663343562643930393962323834663861373437 Feb 9 19:53:21.473000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.473000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=1838 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363934356130363663343562643930393962323834663861373437 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.474000 audit: BPF prog-id=75 op=LOAD Feb 9 19:53:21.474000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c000300750 items=0 ppid=1838 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363934356130363663343562643930393962323834663861373437 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.475000 audit: BPF prog-id=76 op=LOAD Feb 9 19:53:21.475000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000300798 items=0 ppid=1838 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363934356130363663343562643930393962323834663861373437 Feb 9 19:53:21.476000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:53:21.476000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.476000 audit: BPF prog-id=77 op=LOAD Feb 9 19:53:21.476000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000300ba8 items=0 ppid=1838 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236363934356130363663343562643930393962323834663861373437 Feb 9 19:53:21.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.478000 audit: BPF prog-id=78 op=LOAD Feb 9 19:53:21.491000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.497427 kernel: kauditd_printk_skb: 611 callbacks suppressed Feb 9 19:53:21.497567 kernel: audit: type=1400 audit(1707508401.491:581): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.491000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.549410 env[1154]: time="2024-02-09T19:53:21.549353722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal,Uid:9e2e5973323e9fef9d2f4b3abb0245a0,Namespace:kube-system,Attempt:0,} returns sandbox id \"ef0a19a2728b41f106c6942ec0244fef1a69f349a11f1824b5d0c99c57345938\"" Feb 9 19:53:21.554116 kernel: audit: type=1300 audit(1707508401.491:581): arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.557595 kubelet[1737]: E0209 19:53:21.557259 1737 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-21291" Feb 9 19:53:21.560982 env[1154]: time="2024-02-09T19:53:21.560933708Z" level=info msg="CreateContainer within sandbox \"ef0a19a2728b41f106c6942ec0244fef1a69f349a11f1824b5d0c99c57345938\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 9 19:53:21.566593 env[1154]: time="2024-02-09T19:53:21.566542885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal,Uid:96111b8ee155beabad6d24e3bb52833c,Namespace:kube-system,Attempt:0,} returns sandbox id \"266945a066c45bd9099b284f8a74771773004d1fb81746ff81948e942527489b\"" Feb 9 19:53:21.568546 kubelet[1737]: E0209 19:53:21.568210 1737 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-21291" Feb 9 19:53:21.570267 env[1154]: time="2024-02-09T19:53:21.570216966Z" level=info msg="CreateContainer within sandbox \"266945a066c45bd9099b284f8a74771773004d1fb81746ff81948e942527489b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 9 19:53:21.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.631805 kernel: audit: type=1327 audit(1707508401.491:581): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.631947 kernel: audit: type=1400 audit(1707508401.520:582): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.649670 env[1154]: time="2024-02-09T19:53:21.642456664Z" level=info msg="CreateContainer within sandbox \"ef0a19a2728b41f106c6942ec0244fef1a69f349a11f1824b5d0c99c57345938\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"49aeeaf76e183f19e0728c00355245204dc526e49a6d9c8efd000d54827518c1\"" Feb 9 19:53:21.652940 env[1154]: time="2024-02-09T19:53:21.652897591Z" level=info msg="StartContainer for \"49aeeaf76e183f19e0728c00355245204dc526e49a6d9c8efd000d54827518c1\"" Feb 9 19:53:21.669141 kernel: audit: type=1300 audit(1707508401.520:582): arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.676885 kubelet[1737]: E0209 19:53:21.676183 1737 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.37:6443: connect: connection refused Feb 9 19:53:21.700252 kernel: audit: type=1327 audit(1707508401.520:582): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.700365 kernel: audit: type=1400 audit(1707508401.520:583): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.702308 systemd[1]: Started cri-containerd-49aeeaf76e183f19e0728c00355245204dc526e49a6d9c8efd000d54827518c1.scope. Feb 9 19:53:21.709233 env[1154]: time="2024-02-09T19:53:21.709188955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal,Uid:8d46fed125f6375e48d891ca2843da0d,Namespace:kube-system,Attempt:0,} returns sandbox id \"739d508b1e6b8b652f50457b79369160aea1795c72c5941d4ff15cf909310444\"" Feb 9 19:53:21.711513 kubelet[1737]: E0209 19:53:21.711188 1737 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flat" Feb 9 19:53:21.713236 env[1154]: time="2024-02-09T19:53:21.713197075Z" level=info msg="CreateContainer within sandbox \"739d508b1e6b8b652f50457b79369160aea1795c72c5941d4ff15cf909310444\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 9 19:53:21.726142 kernel: audit: type=1400 audit(1707508401.520:583): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.761684 kernel: audit: type=1400 audit(1707508401.520:583): avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.761834 kernel: audit: type=1400 audit(1707508401.520:583): avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit: BPF prog-id=79 op=LOAD Feb 9 19:53:21.520000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c8570 items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit: BPF prog-id=80 op=LOAD Feb 9 19:53:21.520000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c85b8 items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.520000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:53:21.520000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.520000 audit: BPF prog-id=81 op=LOAD Feb 9 19:53:21.520000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c89c8 items=0 ppid=1859 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733396435303862316536623862363532663530343537623739333639 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.786000 audit: BPF prog-id=82 op=LOAD Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1813 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616565616637366531383366313965303732386330303335353234 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1813 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616565616637366531383366313965303732386330303335353234 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit: BPF prog-id=83 op=LOAD Feb 9 19:53:21.787000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003d2080 items=0 ppid=1813 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616565616637366531383366313965303732386330303335353234 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.787000 audit: BPF prog-id=84 op=LOAD Feb 9 19:53:21.787000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d20c8 items=0 ppid=1813 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.787000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616565616637366531383366313965303732386330303335353234 Feb 9 19:53:21.788000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:53:21.788000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { perfmon } for pid=1938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit[1938]: AVC avc: denied { bpf } for pid=1938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.788000 audit: BPF prog-id=85 op=LOAD Feb 9 19:53:21.788000 audit[1938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d24d8 items=0 ppid=1813 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616565616637366531383366313965303732386330303335353234 Feb 9 19:53:21.792457 env[1154]: time="2024-02-09T19:53:21.790537702Z" level=info msg="CreateContainer within sandbox \"266945a066c45bd9099b284f8a74771773004d1fb81746ff81948e942527489b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9085ca1bf66faa7d60b5b7d679e9f01d5176ea0ebd60c43d5b5196703aa9ee86\"" Feb 9 19:53:21.792730 env[1154]: time="2024-02-09T19:53:21.792681176Z" level=info msg="StartContainer for \"9085ca1bf66faa7d60b5b7d679e9f01d5176ea0ebd60c43d5b5196703aa9ee86\"" Feb 9 19:53:21.818969 env[1154]: time="2024-02-09T19:53:21.818914105Z" level=info msg="CreateContainer within sandbox \"739d508b1e6b8b652f50457b79369160aea1795c72c5941d4ff15cf909310444\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"4ea8bb81a578407e842259ec7a2cbe976a98aeb16caff2565dd0461c9c7c48b7\"" Feb 9 19:53:21.819813 env[1154]: time="2024-02-09T19:53:21.819776954Z" level=info msg="StartContainer for \"4ea8bb81a578407e842259ec7a2cbe976a98aeb16caff2565dd0461c9c7c48b7\"" Feb 9 19:53:21.846220 systemd[1]: Started cri-containerd-9085ca1bf66faa7d60b5b7d679e9f01d5176ea0ebd60c43d5b5196703aa9ee86.scope. Feb 9 19:53:21.872669 env[1154]: time="2024-02-09T19:53:21.872614424Z" level=info msg="StartContainer for \"49aeeaf76e183f19e0728c00355245204dc526e49a6d9c8efd000d54827518c1\" returns successfully" Feb 9 19:53:21.878362 systemd[1]: Started cri-containerd-4ea8bb81a578407e842259ec7a2cbe976a98aeb16caff2565dd0461c9c7c48b7.scope. Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.883000 audit: BPF prog-id=86 op=LOAD Feb 9 19:53:21.887000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.887000 audit[1963]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1838 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930383563613162663636666161376436306235623764363739653966 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1838 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930383563613162663636666161376436306235623764363739653966 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit: BPF prog-id=87 op=LOAD Feb 9 19:53:21.888000 audit[1963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021a160 items=0 ppid=1838 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930383563613162663636666161376436306235623764363739653966 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit: BPF prog-id=88 op=LOAD Feb 9 19:53:21.888000 audit[1963]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021a1a8 items=0 ppid=1838 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930383563613162663636666161376436306235623764363739653966 Feb 9 19:53:21.888000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:53:21.888000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.888000 audit: BPF prog-id=89 op=LOAD Feb 9 19:53:21.888000 audit[1963]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021a5b8 items=0 ppid=1838 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930383563613162663636666161376436306235623764363739653966 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.915000 audit: BPF prog-id=90 op=LOAD Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1859 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613862623831613537383430376538343232353965633761326362 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1859 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613862623831613537383430376538343232353965633761326362 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit: BPF prog-id=91 op=LOAD Feb 9 19:53:21.916000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003350d0 items=0 ppid=1859 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613862623831613537383430376538343232353965633761326362 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit: BPF prog-id=92 op=LOAD Feb 9 19:53:21.916000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000335118 items=0 ppid=1859 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613862623831613537383430376538343232353965633761326362 Feb 9 19:53:21.916000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:53:21.916000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { perfmon } for pid=1984 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit[1984]: AVC avc: denied { bpf } for pid=1984 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:21.916000 audit: BPF prog-id=93 op=LOAD Feb 9 19:53:21.916000 audit[1984]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000335528 items=0 ppid=1859 pid=1984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:21.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465613862623831613537383430376538343232353965633761326362 Feb 9 19:53:21.978288 env[1154]: time="2024-02-09T19:53:21.978229908Z" level=info msg="StartContainer for \"9085ca1bf66faa7d60b5b7d679e9f01d5176ea0ebd60c43d5b5196703aa9ee86\" returns successfully" Feb 9 19:53:22.002160 env[1154]: time="2024-02-09T19:53:22.002103199Z" level=info msg="StartContainer for \"4ea8bb81a578407e842259ec7a2cbe976a98aeb16caff2565dd0461c9c7c48b7\" returns successfully" Feb 9 19:53:22.794585 kubelet[1737]: I0209 19:53:22.794549 1737 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:23.784000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:23.784000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bea000 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:23.784000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:23.785000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:23.785000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000be0040 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:23.785000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:25.157000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:25.157000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002a7e000 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:53:25.157000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:53:25.157000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:25.157000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c001950040 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:53:25.157000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:53:25.158000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:25.158000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c002a7e180 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:53:25.158000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:53:25.163000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:25.163000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c002a7f920 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:53:25.163000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:53:25.164000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:25.164000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c001950d00 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:53:25.164000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:53:25.165000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:25.165000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c002a7fa10 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:53:25.165000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:53:25.337114 kubelet[1737]: E0209 19:53:25.337059 1737 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" not found" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:25.366356 kubelet[1737]: I0209 19:53:25.366313 1737 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:25.374729 kubelet[1737]: E0209 19:53:25.374691 1737 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\": nodes \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" not found" Feb 9 19:53:25.432999 kubelet[1737]: E0209 19:53:25.432852 1737 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" not found" Feb 9 19:53:25.654095 kubelet[1737]: I0209 19:53:25.654033 1737 apiserver.go:52] "Watching apiserver" Feb 9 19:53:25.664371 kubelet[1737]: I0209 19:53:25.664330 1737 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:53:25.715540 kubelet[1737]: I0209 19:53:25.715479 1737 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:53:25.826281 kubelet[1737]: E0209 19:53:25.825684 1737 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:27.899937 systemd[1]: Reloading. Feb 9 19:53:28.005323 /usr/lib/systemd/system-generators/torcx-generator[2067]: time="2024-02-09T19:53:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:53:28.005954 /usr/lib/systemd/system-generators/torcx-generator[2067]: time="2024-02-09T19:53:28Z" level=info msg="torcx already run" Feb 9 19:53:28.116253 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:53:28.116530 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:53:28.143589 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:53:28.285407 kernel: kauditd_printk_skb: 231 callbacks suppressed Feb 9 19:53:28.285600 kernel: audit: type=1400 audit(1707508408.256:650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332193 kernel: audit: type=1400 audit(1707508408.256:651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332376 kernel: audit: type=1400 audit(1707508408.256:652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.360985 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:53:28.361144 kernel: audit: type=1400 audit(1707508408.256:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.361217 kernel: audit: audit_lost=104 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.389025 kernel: audit: type=1400 audit(1707508408.256:654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.389184 kernel: audit: backlog limit exceeded Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.414919 kernel: audit: type=1400 audit(1707508408.256:655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.415094 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.283000 audit: BPF prog-id=94 op=LOAD Feb 9 19:53:28.283000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.285000 audit: BPF prog-id=95 op=LOAD Feb 9 19:53:28.285000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.288000 audit: BPF prog-id=96 op=LOAD Feb 9 19:53:28.288000 audit: BPF prog-id=55 op=UNLOAD Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.289000 audit: BPF prog-id=97 op=LOAD Feb 9 19:53:28.289000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.331000 audit: BPF prog-id=98 op=LOAD Feb 9 19:53:28.331000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.392000 audit: BPF prog-id=99 op=LOAD Feb 9 19:53:28.392000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit: BPF prog-id=100 op=LOAD Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.420000 audit: BPF prog-id=101 op=LOAD Feb 9 19:53:28.420000 audit: BPF prog-id=56 op=UNLOAD Feb 9 19:53:28.420000 audit: BPF prog-id=57 op=UNLOAD Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit: BPF prog-id=102 op=LOAD Feb 9 19:53:28.423000 audit: BPF prog-id=58 op=UNLOAD Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit: BPF prog-id=103 op=LOAD Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.423000 audit: BPF prog-id=104 op=LOAD Feb 9 19:53:28.423000 audit: BPF prog-id=59 op=UNLOAD Feb 9 19:53:28.423000 audit: BPF prog-id=60 op=UNLOAD Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit: BPF prog-id=105 op=LOAD Feb 9 19:53:28.424000 audit: BPF prog-id=61 op=UNLOAD Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit: BPF prog-id=106 op=LOAD Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.424000 audit: BPF prog-id=107 op=LOAD Feb 9 19:53:28.424000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:53:28.424000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.425000 audit: BPF prog-id=108 op=LOAD Feb 9 19:53:28.425000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:53:28.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit: BPF prog-id=109 op=LOAD Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.426000 audit: BPF prog-id=110 op=LOAD Feb 9 19:53:28.426000 audit: BPF prog-id=65 op=UNLOAD Feb 9 19:53:28.426000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.427000 audit: BPF prog-id=111 op=LOAD Feb 9 19:53:28.427000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.428000 audit: BPF prog-id=112 op=LOAD Feb 9 19:53:28.428000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.432000 audit: BPF prog-id=113 op=LOAD Feb 9 19:53:28.432000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.433000 audit: BPF prog-id=114 op=LOAD Feb 9 19:53:28.433000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:53:28.462122 kubelet[1737]: I0209 19:53:28.461051 1737 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:53:28.461315 systemd[1]: Stopping kubelet.service... Feb 9 19:53:28.482715 systemd[1]: kubelet.service: Deactivated successfully. Feb 9 19:53:28.483010 systemd[1]: Stopped kubelet.service. Feb 9 19:53:28.483127 systemd[1]: kubelet.service: Consumed 1.358s CPU time. Feb 9 19:53:28.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:28.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:28.485811 systemd[1]: Started kubelet.service. Feb 9 19:53:28.627128 kubelet[2111]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:53:28.627625 kubelet[2111]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:53:28.627877 kubelet[2111]: I0209 19:53:28.627830 2111 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:53:28.634272 kubelet[2111]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:53:28.634454 kubelet[2111]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:53:28.679120 kubelet[2111]: I0209 19:53:28.679041 2111 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:53:28.679120 kubelet[2111]: I0209 19:53:28.679105 2111 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:53:28.681112 kubelet[2111]: I0209 19:53:28.679480 2111 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:53:28.684308 kubelet[2111]: I0209 19:53:28.684274 2111 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 9 19:53:28.685529 kubelet[2111]: I0209 19:53:28.685503 2111 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:53:28.710927 kubelet[2111]: I0209 19:53:28.710891 2111 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:53:28.711540 kubelet[2111]: I0209 19:53:28.711519 2111 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:53:28.711849 kubelet[2111]: I0209 19:53:28.711827 2111 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:53:28.712176 kubelet[2111]: I0209 19:53:28.712145 2111 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:53:28.712310 kubelet[2111]: I0209 19:53:28.712297 2111 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:53:28.712492 kubelet[2111]: I0209 19:53:28.712469 2111 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:53:28.721773 kubelet[2111]: I0209 19:53:28.721742 2111 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:53:28.722116 kubelet[2111]: I0209 19:53:28.722047 2111 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:53:28.722378 kubelet[2111]: I0209 19:53:28.722362 2111 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:53:28.722553 kubelet[2111]: I0209 19:53:28.722538 2111 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:53:28.728039 kubelet[2111]: I0209 19:53:28.728016 2111 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:53:28.738736 kubelet[2111]: I0209 19:53:28.738703 2111 server.go:1186] "Started kubelet" Feb 9 19:53:28.740000 audit[2111]: AVC avc: denied { mac_admin } for pid=2111 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.740000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:53:28.740000 audit[2111]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eb8030 a1=c00005d860 a2=c000eb8000 a3=25 items=0 ppid=1 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:28.740000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:53:28.742408 kubelet[2111]: I0209 19:53:28.742387 2111 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:53:28.741000 audit[2111]: AVC avc: denied { mac_admin } for pid=2111 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.741000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:53:28.741000 audit[2111]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00074fcc0 a1=c00005d878 a2=c000eb80c0 a3=25 items=0 ppid=1 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:28.741000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:53:28.742930 kubelet[2111]: I0209 19:53:28.742913 2111 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:53:28.743093 kubelet[2111]: I0209 19:53:28.743063 2111 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:53:28.748064 kubelet[2111]: E0209 19:53:28.748034 2111 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:53:28.748263 kubelet[2111]: E0209 19:53:28.748249 2111 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:53:28.754321 kubelet[2111]: I0209 19:53:28.754294 2111 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:53:28.755417 kubelet[2111]: I0209 19:53:28.755392 2111 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:53:28.763875 kubelet[2111]: I0209 19:53:28.763841 2111 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:53:28.776919 kubelet[2111]: I0209 19:53:28.776880 2111 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:53:28.897161 kubelet[2111]: I0209 19:53:28.895484 2111 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:28.902188 kubelet[2111]: I0209 19:53:28.902161 2111 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:53:28.902385 kubelet[2111]: I0209 19:53:28.902366 2111 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:53:28.902497 kubelet[2111]: I0209 19:53:28.902483 2111 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:53:28.903005 kubelet[2111]: I0209 19:53:28.902982 2111 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 9 19:53:28.903192 kubelet[2111]: I0209 19:53:28.903175 2111 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 9 19:53:28.903330 kubelet[2111]: I0209 19:53:28.903313 2111 policy_none.go:49] "None policy: Start" Feb 9 19:53:28.904669 kubelet[2111]: I0209 19:53:28.904604 2111 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:53:28.904815 kubelet[2111]: I0209 19:53:28.904800 2111 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:53:28.905100 kubelet[2111]: I0209 19:53:28.905066 2111 state_mem.go:75] "Updated machine memory state" Feb 9 19:53:28.916258 kubelet[2111]: I0209 19:53:28.916225 2111 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:28.916561 kubelet[2111]: I0209 19:53:28.916543 2111 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:28.919705 kubelet[2111]: I0209 19:53:28.919675 2111 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:53:28.918000 audit[2111]: AVC avc: denied { mac_admin } for pid=2111 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:28.918000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:53:28.918000 audit[2111]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00143bb30 a1=c00148ccc0 a2=c00143bb00 a3=25 items=0 ppid=1 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:28.918000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:53:28.920378 kubelet[2111]: I0209 19:53:28.920355 2111 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:53:28.920967 kubelet[2111]: I0209 19:53:28.920947 2111 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:53:28.941664 kubelet[2111]: I0209 19:53:28.941627 2111 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:53:29.002221 kubelet[2111]: I0209 19:53:29.002187 2111 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:53:29.002474 kubelet[2111]: I0209 19:53:29.002457 2111 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:53:29.002802 kubelet[2111]: I0209 19:53:29.002783 2111 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:53:29.002986 kubelet[2111]: E0209 19:53:29.002971 2111 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:53:29.103895 kubelet[2111]: I0209 19:53:29.103849 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:29.104232 kubelet[2111]: I0209 19:53:29.104211 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:29.104384 kubelet[2111]: I0209 19:53:29.104368 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:29.287776 kubelet[2111]: I0209 19:53:29.287733 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.288193 kubelet[2111]: I0209 19:53:29.288143 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.288401 kubelet[2111]: I0209 19:53:29.288375 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.288563 kubelet[2111]: I0209 19:53:29.288548 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/96111b8ee155beabad6d24e3bb52833c-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"96111b8ee155beabad6d24e3bb52833c\") " pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.288770 kubelet[2111]: I0209 19:53:29.288746 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.288945 kubelet[2111]: I0209 19:53:29.288924 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8d46fed125f6375e48d891ca2843da0d-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"8d46fed125f6375e48d891ca2843da0d\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.289132 kubelet[2111]: I0209 19:53:29.289117 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9e2e5973323e9fef9d2f4b3abb0245a0-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"9e2e5973323e9fef9d2f4b3abb0245a0\") " pod="kube-system/kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.289301 kubelet[2111]: I0209 19:53:29.289288 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/96111b8ee155beabad6d24e3bb52833c-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"96111b8ee155beabad6d24e3bb52833c\") " pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.289472 kubelet[2111]: I0209 19:53:29.289450 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/96111b8ee155beabad6d24e3bb52833c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" (UID: \"96111b8ee155beabad6d24e3bb52833c\") " pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:29.737291 kubelet[2111]: I0209 19:53:29.737250 2111 apiserver.go:52] "Watching apiserver" Feb 9 19:53:29.802927 kubelet[2111]: I0209 19:53:29.802869 2111 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:53:29.895238 kubelet[2111]: I0209 19:53:29.895187 2111 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:53:29.973000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 9 19:53:29.973000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001d9600 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:29.973000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:30.037214 kubelet[2111]: E0209 19:53:30.037070 2111 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:30.345267 kubelet[2111]: E0209 19:53:30.345095 2111 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:30.539181 kubelet[2111]: E0209 19:53:30.539132 2111 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:53:30.792304 update_engine[1143]: I0209 19:53:30.791471 1143 update_attempter.cc:509] Updating boot flags... Feb 9 19:53:31.282766 kubelet[2111]: I0209 19:53:31.282678 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" podStartSLOduration=2.282586853 pod.CreationTimestamp="2024-02-09 19:53:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:30.764534497 +0000 UTC m=+2.264470731" watchObservedRunningTime="2024-02-09 19:53:31.282586853 +0000 UTC m=+2.782523087" Feb 9 19:53:31.594617 kubelet[2111]: I0209 19:53:31.594475 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" podStartSLOduration=2.594416793 pod.CreationTimestamp="2024-02-09 19:53:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:31.284744902 +0000 UTC m=+2.784681138" watchObservedRunningTime="2024-02-09 19:53:31.594416793 +0000 UTC m=+3.094353026" Feb 9 19:53:31.638000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.638000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000fbd440 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:31.638000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.647000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.647000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000fbd560 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:31.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.653000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.653000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f3a860 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:31.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:31.657000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:53:31.657000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f3a9a0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:53:31.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:53:33.646872 kubelet[2111]: I0209 19:53:33.646745 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" podStartSLOduration=4.646658797 pod.CreationTimestamp="2024-02-09 19:53:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:31.596480398 +0000 UTC m=+3.096416645" watchObservedRunningTime="2024-02-09 19:53:33.646658797 +0000 UTC m=+5.146595031" Feb 9 19:53:34.197590 sudo[1360]: pam_unix(sudo:session): session closed for user root Feb 9 19:53:34.196000 audit[1360]: USER_END pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:53:34.204103 kernel: kauditd_printk_skb: 267 callbacks suppressed Feb 9 19:53:34.204239 kernel: audit: type=1106 audit(1707508414.196:902): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:53:34.196000 audit[1360]: CRED_DISP pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:53:34.252699 kernel: audit: type=1104 audit(1707508414.196:903): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:53:34.253774 sshd[1357]: pam_unix(sshd:session): session closed for user core Feb 9 19:53:34.254000 audit[1357]: USER_END pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:53:34.258523 systemd[1]: sshd@6-10.128.0.37:22-147.75.109.163:37190.service: Deactivated successfully. Feb 9 19:53:34.259699 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:53:34.259920 systemd[1]: session-7.scope: Consumed 5.875s CPU time. Feb 9 19:53:34.263119 systemd-logind[1141]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:53:34.265101 systemd-logind[1141]: Removed session 7. Feb 9 19:53:34.254000 audit[1357]: CRED_DISP pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:53:34.314379 kernel: audit: type=1106 audit(1707508414.254:904): pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:53:34.314565 kernel: audit: type=1104 audit(1707508414.254:905): pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:53:34.314623 kernel: audit: type=1131 audit(1707508414.257:906): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.37:22-147.75.109.163:37190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:34.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.37:22-147.75.109.163:37190 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:43.626712 kubelet[2111]: I0209 19:53:43.626665 2111 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 9 19:53:43.627404 env[1154]: time="2024-02-09T19:53:43.627289151Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:53:43.627916 kubelet[2111]: I0209 19:53:43.627606 2111 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 9 19:53:43.695094 kubelet[2111]: I0209 19:53:43.695035 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:43.703127 systemd[1]: Created slice kubepods-besteffort-pod98901b50_5cc3_46c9_b5f2_d754bede2953.slice. Feb 9 19:53:43.736296 kubelet[2111]: W0209 19:53:43.736256 2111 reflector.go:424] object-"kube-system"/"kube-proxy": failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' and this object Feb 9 19:53:43.736296 kubelet[2111]: E0209 19:53:43.736307 2111 reflector.go:140] object-"kube-system"/"kube-proxy": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-proxy" is forbidden: User "system:node:ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' and this object Feb 9 19:53:43.736621 kubelet[2111]: W0209 19:53:43.736560 2111 reflector.go:424] object-"kube-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' and this object Feb 9 19:53:43.736621 kubelet[2111]: E0209 19:53:43.736621 2111 reflector.go:140] object-"kube-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' and this object Feb 9 19:53:43.787853 kubelet[2111]: I0209 19:53:43.787812 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/98901b50-5cc3-46c9-b5f2-d754bede2953-kube-proxy\") pod \"kube-proxy-snnjl\" (UID: \"98901b50-5cc3-46c9-b5f2-d754bede2953\") " pod="kube-system/kube-proxy-snnjl" Feb 9 19:53:43.788196 kubelet[2111]: I0209 19:53:43.788173 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8qdrp\" (UniqueName: \"kubernetes.io/projected/98901b50-5cc3-46c9-b5f2-d754bede2953-kube-api-access-8qdrp\") pod \"kube-proxy-snnjl\" (UID: \"98901b50-5cc3-46c9-b5f2-d754bede2953\") " pod="kube-system/kube-proxy-snnjl" Feb 9 19:53:43.788386 kubelet[2111]: I0209 19:53:43.788370 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/98901b50-5cc3-46c9-b5f2-d754bede2953-xtables-lock\") pod \"kube-proxy-snnjl\" (UID: \"98901b50-5cc3-46c9-b5f2-d754bede2953\") " pod="kube-system/kube-proxy-snnjl" Feb 9 19:53:43.788531 kubelet[2111]: I0209 19:53:43.788515 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/98901b50-5cc3-46c9-b5f2-d754bede2953-lib-modules\") pod \"kube-proxy-snnjl\" (UID: \"98901b50-5cc3-46c9-b5f2-d754bede2953\") " pod="kube-system/kube-proxy-snnjl" Feb 9 19:53:44.073920 kubelet[2111]: I0209 19:53:44.073852 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:44.081011 systemd[1]: Created slice kubepods-besteffort-podfed48b49_2551_4f25_969a_79ebb835abd1.slice. Feb 9 19:53:44.191566 kubelet[2111]: I0209 19:53:44.191522 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fed48b49-2551-4f25-969a-79ebb835abd1-var-lib-calico\") pod \"tigera-operator-cfc98749c-8zhb5\" (UID: \"fed48b49-2551-4f25-969a-79ebb835abd1\") " pod="tigera-operator/tigera-operator-cfc98749c-8zhb5" Feb 9 19:53:44.192007 kubelet[2111]: I0209 19:53:44.191982 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hxlg\" (UniqueName: \"kubernetes.io/projected/fed48b49-2551-4f25-969a-79ebb835abd1-kube-api-access-2hxlg\") pod \"tigera-operator-cfc98749c-8zhb5\" (UID: \"fed48b49-2551-4f25-969a-79ebb835abd1\") " pod="tigera-operator/tigera-operator-cfc98749c-8zhb5" Feb 9 19:53:44.386104 env[1154]: time="2024-02-09T19:53:44.385942016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-8zhb5,Uid:fed48b49-2551-4f25-969a-79ebb835abd1,Namespace:tigera-operator,Attempt:0,}" Feb 9 19:53:44.415923 env[1154]: time="2024-02-09T19:53:44.415817382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:44.415923 env[1154]: time="2024-02-09T19:53:44.415877220Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:44.416254 env[1154]: time="2024-02-09T19:53:44.415895733Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:44.416464 env[1154]: time="2024-02-09T19:53:44.416404877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c60284deba9cba9b77eaa632bbf095f25b16b8b1b844df0f6ccc911162723680 pid=2232 runtime=io.containerd.runc.v2 Feb 9 19:53:44.444015 systemd[1]: run-containerd-runc-k8s.io-c60284deba9cba9b77eaa632bbf095f25b16b8b1b844df0f6ccc911162723680-runc.JS31O4.mount: Deactivated successfully. Feb 9 19:53:44.451279 systemd[1]: Started cri-containerd-c60284deba9cba9b77eaa632bbf095f25b16b8b1b844df0f6ccc911162723680.scope. Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491484 kernel: audit: type=1400 audit(1707508424.469:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.513103 kernel: audit: type=1400 audit(1707508424.469:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.555865 kernel: audit: type=1400 audit(1707508424.469:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.556024 kernel: audit: type=1400 audit(1707508424.469:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.578118 kernel: audit: type=1400 audit(1707508424.469:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.578279 kernel: audit: type=1400 audit(1707508424.469:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.642825 kernel: audit: type=1400 audit(1707508424.469:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.642977 kernel: audit: type=1400 audit(1707508424.469:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.643020 kernel: audit: type=1400 audit(1707508424.469:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.687180 kernel: audit: type=1400 audit(1707508424.490:916): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.687305 env[1154]: time="2024-02-09T19:53:44.686975107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-8zhb5,Uid:fed48b49-2551-4f25-969a-79ebb835abd1,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c60284deba9cba9b77eaa632bbf095f25b16b8b1b844df0f6ccc911162723680\"" Feb 9 19:53:44.490000 audit: BPF prog-id=115 op=LOAD Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2232 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:44.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303238346465626139636261396237376561613633326262663039 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2232 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:44.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303238346465626139636261396237376561613633326262663039 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.491000 audit: BPF prog-id=116 op=LOAD Feb 9 19:53:44.491000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000219000 items=0 ppid=2232 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:44.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303238346465626139636261396237376561613633326262663039 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit: BPF prog-id=117 op=LOAD Feb 9 19:53:44.511000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003d41c8 items=0 ppid=2232 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:44.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303238346465626139636261396237376561613633326262663039 Feb 9 19:53:44.511000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:53:44.511000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:44.511000 audit: BPF prog-id=118 op=LOAD Feb 9 19:53:44.511000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003d45d8 items=0 ppid=2232 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:44.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303238346465626139636261396237376561613633326262663039 Feb 9 19:53:44.694426 kubelet[2111]: E0209 19:53:44.694378 2111 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:53:44.694922 env[1154]: time="2024-02-09T19:53:44.694810090Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 9 19:53:44.890370 kubelet[2111]: E0209 19:53:44.890316 2111 configmap.go:199] Couldn't get configMap kube-system/kube-proxy: failed to sync configmap cache: timed out waiting for the condition Feb 9 19:53:44.890574 kubelet[2111]: E0209 19:53:44.890443 2111 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/98901b50-5cc3-46c9-b5f2-d754bede2953-kube-proxy podName:98901b50-5cc3-46c9-b5f2-d754bede2953 nodeName:}" failed. No retries permitted until 2024-02-09 19:53:45.390413993 +0000 UTC m=+16.890350209 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-proxy" (UniqueName: "kubernetes.io/configmap/98901b50-5cc3-46c9-b5f2-d754bede2953-kube-proxy") pod "kube-proxy-snnjl" (UID: "98901b50-5cc3-46c9-b5f2-d754bede2953") : failed to sync configmap cache: timed out waiting for the condition Feb 9 19:53:45.479976 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1167048806.mount: Deactivated successfully. Feb 9 19:53:45.511475 env[1154]: time="2024-02-09T19:53:45.511413923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-snnjl,Uid:98901b50-5cc3-46c9-b5f2-d754bede2953,Namespace:kube-system,Attempt:0,}" Feb 9 19:53:45.538921 env[1154]: time="2024-02-09T19:53:45.538804659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:45.538921 env[1154]: time="2024-02-09T19:53:45.538871200Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:45.539234 env[1154]: time="2024-02-09T19:53:45.538892011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:45.539234 env[1154]: time="2024-02-09T19:53:45.539115739Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/802c2ce77293186992fa1c2e4dd655d0d2eabe2d1806fc11a3e1d145ff64ff72 pid=2273 runtime=io.containerd.runc.v2 Feb 9 19:53:45.576417 systemd[1]: Started cri-containerd-802c2ce77293186992fa1c2e4dd655d0d2eabe2d1806fc11a3e1d145ff64ff72.scope. Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.600000 audit: BPF prog-id=119 op=LOAD Feb 9 19:53:45.601000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.601000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2273 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326332636537373239333138363939326661316332653464643635 Feb 9 19:53:45.601000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.601000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2273 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326332636537373239333138363939326661316332653464643635 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.602000 audit: BPF prog-id=120 op=LOAD Feb 9 19:53:45.602000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024380 items=0 ppid=2273 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326332636537373239333138363939326661316332653464643635 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.603000 audit: BPF prog-id=121 op=LOAD Feb 9 19:53:45.603000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243c8 items=0 ppid=2273 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326332636537373239333138363939326661316332653464643635 Feb 9 19:53:45.604000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:53:45.604000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.604000 audit: BPF prog-id=122 op=LOAD Feb 9 19:53:45.604000 audit[2283]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247d8 items=0 ppid=2273 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326332636537373239333138363939326661316332653464643635 Feb 9 19:53:45.661147 env[1154]: time="2024-02-09T19:53:45.661084804Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-snnjl,Uid:98901b50-5cc3-46c9-b5f2-d754bede2953,Namespace:kube-system,Attempt:0,} returns sandbox id \"802c2ce77293186992fa1c2e4dd655d0d2eabe2d1806fc11a3e1d145ff64ff72\"" Feb 9 19:53:45.669687 env[1154]: time="2024-02-09T19:53:45.669633771Z" level=info msg="CreateContainer within sandbox \"802c2ce77293186992fa1c2e4dd655d0d2eabe2d1806fc11a3e1d145ff64ff72\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:53:45.703564 env[1154]: time="2024-02-09T19:53:45.703489044Z" level=info msg="CreateContainer within sandbox \"802c2ce77293186992fa1c2e4dd655d0d2eabe2d1806fc11a3e1d145ff64ff72\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"4d302845fa9184a0b52b303fe318564818d19ed8613c2d8930877671d0b1acf4\"" Feb 9 19:53:45.706951 env[1154]: time="2024-02-09T19:53:45.706874864Z" level=info msg="StartContainer for \"4d302845fa9184a0b52b303fe318564818d19ed8613c2d8930877671d0b1acf4\"" Feb 9 19:53:45.733766 systemd[1]: Started cri-containerd-4d302845fa9184a0b52b303fe318564818d19ed8613c2d8930877671d0b1acf4.scope. Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2273 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464333032383435666139313834613062353262333033666533313835 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit: BPF prog-id=123 op=LOAD Feb 9 19:53:45.773000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0003800b0 items=0 ppid=2273 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464333032383435666139313834613062353262333033666533313835 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.773000 audit: BPF prog-id=124 op=LOAD Feb 9 19:53:45.773000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c0003800f8 items=0 ppid=2273 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464333032383435666139313834613062353262333033666533313835 Feb 9 19:53:45.774000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:53:45.774000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { perfmon } for pid=2313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit[2313]: AVC avc: denied { bpf } for pid=2313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:45.774000 audit: BPF prog-id=125 op=LOAD Feb 9 19:53:45.774000 audit[2313]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000380188 items=0 ppid=2273 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464333032383435666139313834613062353262333033666533313835 Feb 9 19:53:45.816337 env[1154]: time="2024-02-09T19:53:45.816275454Z" level=info msg="StartContainer for \"4d302845fa9184a0b52b303fe318564818d19ed8613c2d8930877671d0b1acf4\" returns successfully" Feb 9 19:53:45.937000 audit[2362]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:45.937000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff04fa8c0 a2=0 a3=7ffff04fa8ac items=0 ppid=2323 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:53:45.940000 audit[2363]: NETFILTER_CFG table=mangle:60 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:45.940000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff41fdb640 a2=0 a3=7fff41fdb62c items=0 ppid=2323 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:53:45.943000 audit[2364]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:45.943000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9f37dc20 a2=0 a3=7fff9f37dc0c items=0 ppid=2323 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:53:45.946000 audit[2365]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:45.946000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfb08fc30 a2=0 a3=7ffdfb08fc1c items=0 ppid=2323 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:53:45.948000 audit[2366]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:45.948000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc683bb3e0 a2=0 a3=7ffc683bb3cc items=0 ppid=2323 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:53:45.951000 audit[2367]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:45.951000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9fc6fe00 a2=0 a3=7fff9fc6fdec items=0 ppid=2323 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:45.951000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:53:46.036000 audit[2368]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.036000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffecf531490 a2=0 a3=7ffecf53147c items=0 ppid=2323 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.036000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:53:46.041000 audit[2370]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.041000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc0ad0f940 a2=0 a3=7ffc0ad0f92c items=0 ppid=2323 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:53:46.064661 kubelet[2111]: I0209 19:53:46.064620 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-snnjl" podStartSLOduration=3.064535857 pod.CreationTimestamp="2024-02-09 19:53:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:46.063562767 +0000 UTC m=+17.563499001" watchObservedRunningTime="2024-02-09 19:53:46.064535857 +0000 UTC m=+17.564472091" Feb 9 19:53:46.067000 audit[2373]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.067000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffccc0174d0 a2=0 a3=7ffccc0174bc items=0 ppid=2323 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:53:46.069000 audit[2374]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.069000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd57fd12d0 a2=0 a3=7ffd57fd12bc items=0 ppid=2323 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:53:46.075000 audit[2377]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.075000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4a404db0 a2=0 a3=7ffc4a404d9c items=0 ppid=2323 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:53:46.078000 audit[2378]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.078000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3daa2090 a2=0 a3=7fff3daa207c items=0 ppid=2323 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:53:46.082000 audit[2380]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.082000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff9cfb2480 a2=0 a3=7fff9cfb246c items=0 ppid=2323 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:53:46.088000 audit[2383]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.088000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5bc89e40 a2=0 a3=7ffc5bc89e2c items=0 ppid=2323 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:53:46.090000 audit[2384]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.090000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5b2dfbf0 a2=0 a3=7fff5b2dfbdc items=0 ppid=2323 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:53:46.108000 audit[2386]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.108000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdd10b730 a2=0 a3=7fffdd10b71c items=0 ppid=2323 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:53:46.111000 audit[2387]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.111000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff2251a750 a2=0 a3=7fff2251a73c items=0 ppid=2323 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:53:46.119000 audit[2389]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.119000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe57ec9970 a2=0 a3=7ffe57ec995c items=0 ppid=2323 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:53:46.128000 audit[2392]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.128000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff064c9450 a2=0 a3=7fff064c943c items=0 ppid=2323 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:53:46.143000 audit[2395]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.143000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf7067940 a2=0 a3=7ffdf706792c items=0 ppid=2323 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:53:46.146000 audit[2396]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.146000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc2056f60 a2=0 a3=7ffcc2056f4c items=0 ppid=2323 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:53:46.152000 audit[2398]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.152000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffce675f5b0 a2=0 a3=7ffce675f59c items=0 ppid=2323 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:53:46.159000 audit[2401]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:53:46.159000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb778ba40 a2=0 a3=7ffcb778ba2c items=0 ppid=2323 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:53:46.181000 audit[2405]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:46.181000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd141791a0 a2=0 a3=7ffd1417918c items=0 ppid=2323 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:46.192000 audit[2405]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:46.192000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd141791a0 a2=0 a3=7ffd1417918c items=0 ppid=2323 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.192000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:46.200000 audit[2409]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.200000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffb197ef40 a2=0 a3=7fffb197ef2c items=0 ppid=2323 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:53:46.207000 audit[2411]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.207000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe21a51900 a2=0 a3=7ffe21a518ec items=0 ppid=2323 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:53:46.214000 audit[2414]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.214000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2ca3d8b0 a2=0 a3=7ffe2ca3d89c items=0 ppid=2323 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:53:46.217000 audit[2415]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.217000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb988aee0 a2=0 a3=7fffb988aecc items=0 ppid=2323 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:53:46.222000 audit[2417]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.222000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed98f52a0 a2=0 a3=7ffed98f528c items=0 ppid=2323 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:53:46.224000 audit[2418]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.224000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea4dc51c0 a2=0 a3=7ffea4dc51ac items=0 ppid=2323 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:53:46.229000 audit[2420]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.229000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc56a2d7f0 a2=0 a3=7ffc56a2d7dc items=0 ppid=2323 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:53:46.238000 audit[2423]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.238000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdfb904530 a2=0 a3=7ffdfb90451c items=0 ppid=2323 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:53:46.240000 audit[2424]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.240000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7fe9ea50 a2=0 a3=7ffc7fe9ea3c items=0 ppid=2323 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.240000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:53:46.245000 audit[2426]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.245000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc0e82d8b0 a2=0 a3=7ffc0e82d89c items=0 ppid=2323 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:53:46.248000 audit[2427]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.248000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc042e49b0 a2=0 a3=7ffc042e499c items=0 ppid=2323 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:53:46.253000 audit[2429]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.253000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd58e8e6a0 a2=0 a3=7ffd58e8e68c items=0 ppid=2323 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:53:46.260000 audit[2432]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.260000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe7f826010 a2=0 a3=7ffe7f825ffc items=0 ppid=2323 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:53:46.267000 audit[2435]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.267000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc94b74f30 a2=0 a3=7ffc94b74f1c items=0 ppid=2323 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:53:46.270000 audit[2436]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.270000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffebb146710 a2=0 a3=7ffebb1466fc items=0 ppid=2323 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:53:46.274000 audit[2438]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.274000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffccf776d00 a2=0 a3=7ffccf776cec items=0 ppid=2323 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:53:46.283000 audit[2441]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=2441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:53:46.283000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffc8517f80 a2=0 a3=7fffc8517f6c items=0 ppid=2323 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:53:46.294000 audit[2445]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:53:46.294000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc21e33120 a2=0 a3=7ffc21e3310c items=0 ppid=2323 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.294000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:46.295000 audit[2445]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:53:46.295000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc21e33120 a2=0 a3=7ffc21e3310c items=0 ppid=2323 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:46.295000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:46.933008 env[1154]: time="2024-02-09T19:53:46.932938963Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:46.936162 env[1154]: time="2024-02-09T19:53:46.936028651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:46.939236 env[1154]: time="2024-02-09T19:53:46.939159102Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:46.942163 env[1154]: time="2024-02-09T19:53:46.942112675Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:46.943544 env[1154]: time="2024-02-09T19:53:46.943480177Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 9 19:53:46.949704 env[1154]: time="2024-02-09T19:53:46.949630699Z" level=info msg="CreateContainer within sandbox \"c60284deba9cba9b77eaa632bbf095f25b16b8b1b844df0f6ccc911162723680\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 9 19:53:46.974747 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2777552079.mount: Deactivated successfully. Feb 9 19:53:46.981440 env[1154]: time="2024-02-09T19:53:46.981317067Z" level=info msg="CreateContainer within sandbox \"c60284deba9cba9b77eaa632bbf095f25b16b8b1b844df0f6ccc911162723680\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"191a49a2cf73f4660975df2d59141f332aae22489abba9283986d005f52240c8\"" Feb 9 19:53:46.984062 env[1154]: time="2024-02-09T19:53:46.983991480Z" level=info msg="StartContainer for \"191a49a2cf73f4660975df2d59141f332aae22489abba9283986d005f52240c8\"" Feb 9 19:53:47.019371 systemd[1]: Started cri-containerd-191a49a2cf73f4660975df2d59141f332aae22489abba9283986d005f52240c8.scope. Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.042000 audit: BPF prog-id=126 op=LOAD Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2232 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:47.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139316134396132636637336634363630393735646632643539313431 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2232 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:47.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139316134396132636637336634363630393735646632643539313431 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit: BPF prog-id=127 op=LOAD Feb 9 19:53:47.043000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000234c00 items=0 ppid=2232 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:47.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139316134396132636637336634363630393735646632643539313431 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit: BPF prog-id=128 op=LOAD Feb 9 19:53:47.043000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000234c48 items=0 ppid=2232 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:47.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139316134396132636637336634363630393735646632643539313431 Feb 9 19:53:47.043000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:53:47.043000 audit: BPF prog-id=127 op=UNLOAD Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:47.043000 audit: BPF prog-id=129 op=LOAD Feb 9 19:53:47.043000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000235058 items=0 ppid=2232 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:47.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139316134396132636637336634363630393735646632643539313431 Feb 9 19:53:47.076145 env[1154]: time="2024-02-09T19:53:47.072350404Z" level=info msg="StartContainer for \"191a49a2cf73f4660975df2d59141f332aae22489abba9283986d005f52240c8\" returns successfully" Feb 9 19:53:49.035648 kubelet[2111]: I0209 19:53:49.035603 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-8zhb5" podStartSLOduration=-9.22337203081922e+09 pod.CreationTimestamp="2024-02-09 19:53:43 +0000 UTC" firstStartedPulling="2024-02-09 19:53:44.689792308 +0000 UTC m=+16.189728535" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:48.071055315 +0000 UTC m=+19.570991550" watchObservedRunningTime="2024-02-09 19:53:49.035555519 +0000 UTC m=+20.535491745" Feb 9 19:53:49.250000 audit[2510]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:49.250000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff1e6ab0c0 a2=0 a3=7fff1e6ab0ac items=0 ppid=2323 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:49.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:49.251000 audit[2510]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=2510 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:49.251000 audit[2510]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff1e6ab0c0 a2=0 a3=7fff1e6ab0ac items=0 ppid=2323 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:49.251000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:49.346201 kubelet[2111]: I0209 19:53:49.346034 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:49.359340 systemd[1]: Created slice kubepods-besteffort-podd936749e_0bef_4bbc_bf16_31185d6196b7.slice. Feb 9 19:53:49.394000 audit[2536]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:49.394000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff348d4a20 a2=0 a3=7fff348d4a0c items=0 ppid=2323 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:49.394000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:49.397000 audit[2536]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:49.397000 audit[2536]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff348d4a20 a2=0 a3=7fff348d4a0c items=0 ppid=2323 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:49.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:49.467949 kubelet[2111]: I0209 19:53:49.467907 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9fmfq\" (UniqueName: \"kubernetes.io/projected/d936749e-0bef-4bbc-bf16-31185d6196b7-kube-api-access-9fmfq\") pod \"calico-typha-5cc9b9bcd-ddsks\" (UID: \"d936749e-0bef-4bbc-bf16-31185d6196b7\") " pod="calico-system/calico-typha-5cc9b9bcd-ddsks" Feb 9 19:53:49.468382 kubelet[2111]: I0209 19:53:49.468356 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d936749e-0bef-4bbc-bf16-31185d6196b7-typha-certs\") pod \"calico-typha-5cc9b9bcd-ddsks\" (UID: \"d936749e-0bef-4bbc-bf16-31185d6196b7\") " pod="calico-system/calico-typha-5cc9b9bcd-ddsks" Feb 9 19:53:49.468576 kubelet[2111]: I0209 19:53:49.468556 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d936749e-0bef-4bbc-bf16-31185d6196b7-tigera-ca-bundle\") pod \"calico-typha-5cc9b9bcd-ddsks\" (UID: \"d936749e-0bef-4bbc-bf16-31185d6196b7\") " pod="calico-system/calico-typha-5cc9b9bcd-ddsks" Feb 9 19:53:49.500192 kubelet[2111]: I0209 19:53:49.500147 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:49.508281 systemd[1]: Created slice kubepods-besteffort-pod3fc3eafe_cfd6_4a9e_b3d3_94336245e4c8.slice. Feb 9 19:53:49.623898 kubelet[2111]: I0209 19:53:49.623763 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:49.624486 kubelet[2111]: E0209 19:53:49.624450 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:53:49.670639 kubelet[2111]: I0209 19:53:49.670528 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-log-dir\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.670868 kubelet[2111]: I0209 19:53:49.670722 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-lib-modules\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.670868 kubelet[2111]: I0209 19:53:49.670782 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-flexvol-driver-host\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.670868 kubelet[2111]: I0209 19:53:49.670857 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-lib-calico\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671064 kubelet[2111]: I0209 19:53:49.670939 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-tigera-ca-bundle\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671064 kubelet[2111]: I0209 19:53:49.670979 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-net-dir\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671208 kubelet[2111]: I0209 19:53:49.671062 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s2zrp\" (UniqueName: \"kubernetes.io/projected/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-kube-api-access-s2zrp\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671279 kubelet[2111]: I0209 19:53:49.671256 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-run-calico\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671376 kubelet[2111]: I0209 19:53:49.671356 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-bin-dir\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671451 kubelet[2111]: I0209 19:53:49.671434 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-policysync\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671537 kubelet[2111]: I0209 19:53:49.671518 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-xtables-lock\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.671633 kubelet[2111]: I0209 19:53:49.671616 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-node-certs\") pod \"calico-node-975p6\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " pod="calico-system/calico-node-975p6" Feb 9 19:53:49.773299 kubelet[2111]: I0209 19:53:49.772773 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1ed01e30-f309-4f72-8cb5-b2fd43215dfd-kubelet-dir\") pod \"csi-node-driver-5k9nk\" (UID: \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\") " pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:53:49.773534 kubelet[2111]: I0209 19:53:49.773511 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1ed01e30-f309-4f72-8cb5-b2fd43215dfd-varrun\") pod \"csi-node-driver-5k9nk\" (UID: \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\") " pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:53:49.773630 kubelet[2111]: I0209 19:53:49.773575 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1ed01e30-f309-4f72-8cb5-b2fd43215dfd-socket-dir\") pod \"csi-node-driver-5k9nk\" (UID: \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\") " pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:53:49.773700 kubelet[2111]: I0209 19:53:49.773638 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1ed01e30-f309-4f72-8cb5-b2fd43215dfd-registration-dir\") pod \"csi-node-driver-5k9nk\" (UID: \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\") " pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:53:49.773786 kubelet[2111]: I0209 19:53:49.773767 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hp6wd\" (UniqueName: \"kubernetes.io/projected/1ed01e30-f309-4f72-8cb5-b2fd43215dfd-kube-api-access-hp6wd\") pod \"csi-node-driver-5k9nk\" (UID: \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\") " pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:53:49.776681 kubelet[2111]: E0209 19:53:49.776651 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.776885 kubelet[2111]: W0209 19:53:49.776862 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.777008 kubelet[2111]: E0209 19:53:49.776992 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.777432 kubelet[2111]: E0209 19:53:49.777410 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.777557 kubelet[2111]: W0209 19:53:49.777431 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.777557 kubelet[2111]: E0209 19:53:49.777467 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.777829 kubelet[2111]: E0209 19:53:49.777807 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.777913 kubelet[2111]: W0209 19:53:49.777833 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.777984 kubelet[2111]: E0209 19:53:49.777951 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.778218 kubelet[2111]: E0209 19:53:49.778198 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.778218 kubelet[2111]: W0209 19:53:49.778217 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.778351 kubelet[2111]: E0209 19:53:49.778336 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.778580 kubelet[2111]: E0209 19:53:49.778557 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.778667 kubelet[2111]: W0209 19:53:49.778592 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.778740 kubelet[2111]: E0209 19:53:49.778708 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.778969 kubelet[2111]: E0209 19:53:49.778949 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.778969 kubelet[2111]: W0209 19:53:49.778967 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.779158 kubelet[2111]: E0209 19:53:49.779093 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.779347 kubelet[2111]: E0209 19:53:49.779326 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.779347 kubelet[2111]: W0209 19:53:49.779346 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.779491 kubelet[2111]: E0209 19:53:49.779458 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.780264 kubelet[2111]: E0209 19:53:49.779743 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.780264 kubelet[2111]: W0209 19:53:49.779763 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.780264 kubelet[2111]: E0209 19:53:49.779921 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.780618 kubelet[2111]: E0209 19:53:49.780530 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.780704 kubelet[2111]: W0209 19:53:49.780622 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.780821 kubelet[2111]: E0209 19:53:49.780800 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.781160 kubelet[2111]: E0209 19:53:49.781140 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.781160 kubelet[2111]: W0209 19:53:49.781159 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.781300 kubelet[2111]: E0209 19:53:49.781272 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.789168 kubelet[2111]: E0209 19:53:49.789145 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.789337 kubelet[2111]: W0209 19:53:49.789320 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.789565 kubelet[2111]: E0209 19:53:49.789549 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.789833 kubelet[2111]: E0209 19:53:49.789821 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.789933 kubelet[2111]: W0209 19:53:49.789919 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.790141 kubelet[2111]: E0209 19:53:49.790127 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.790446 kubelet[2111]: E0209 19:53:49.790432 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.790557 kubelet[2111]: W0209 19:53:49.790541 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.790801 kubelet[2111]: E0209 19:53:49.790787 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.791142 kubelet[2111]: E0209 19:53:49.791125 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.791252 kubelet[2111]: W0209 19:53:49.791238 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.791447 kubelet[2111]: E0209 19:53:49.791435 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.791711 kubelet[2111]: E0209 19:53:49.791700 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.791808 kubelet[2111]: W0209 19:53:49.791794 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.791990 kubelet[2111]: E0209 19:53:49.791979 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.792288 kubelet[2111]: E0209 19:53:49.792275 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.792393 kubelet[2111]: W0209 19:53:49.792379 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.792589 kubelet[2111]: E0209 19:53:49.792577 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.792844 kubelet[2111]: E0209 19:53:49.792833 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.792935 kubelet[2111]: W0209 19:53:49.792921 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.793183 kubelet[2111]: E0209 19:53:49.793170 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.793497 kubelet[2111]: E0209 19:53:49.793486 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.793592 kubelet[2111]: W0209 19:53:49.793578 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.793759 kubelet[2111]: E0209 19:53:49.793748 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.794026 kubelet[2111]: E0209 19:53:49.794016 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.794145 kubelet[2111]: W0209 19:53:49.794130 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.794369 kubelet[2111]: E0209 19:53:49.794356 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.794921 kubelet[2111]: E0209 19:53:49.794905 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.795208 kubelet[2111]: W0209 19:53:49.795160 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.795487 kubelet[2111]: E0209 19:53:49.795471 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.795871 kubelet[2111]: E0209 19:53:49.795856 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.795988 kubelet[2111]: W0209 19:53:49.795974 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.796240 kubelet[2111]: E0209 19:53:49.796226 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.796622 kubelet[2111]: E0209 19:53:49.796608 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.796728 kubelet[2111]: W0209 19:53:49.796713 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.796900 kubelet[2111]: E0209 19:53:49.796889 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.797208 kubelet[2111]: E0209 19:53:49.797195 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.797310 kubelet[2111]: W0209 19:53:49.797296 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.797420 kubelet[2111]: E0209 19:53:49.797408 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.797730 kubelet[2111]: E0209 19:53:49.797718 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.797854 kubelet[2111]: W0209 19:53:49.797837 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.797953 kubelet[2111]: E0209 19:53:49.797940 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.798343 kubelet[2111]: E0209 19:53:49.798329 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.798450 kubelet[2111]: W0209 19:53:49.798436 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.798552 kubelet[2111]: E0209 19:53:49.798540 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.798857 kubelet[2111]: E0209 19:53:49.798845 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.798949 kubelet[2111]: W0209 19:53:49.798936 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.799044 kubelet[2111]: E0209 19:53:49.799033 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.874919 kubelet[2111]: E0209 19:53:49.874785 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.874919 kubelet[2111]: W0209 19:53:49.874817 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.874919 kubelet[2111]: E0209 19:53:49.874844 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.875287 kubelet[2111]: E0209 19:53:49.875248 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.875287 kubelet[2111]: W0209 19:53:49.875266 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.875390 kubelet[2111]: E0209 19:53:49.875293 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.875806 kubelet[2111]: E0209 19:53:49.875771 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.875806 kubelet[2111]: W0209 19:53:49.875800 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.876037 kubelet[2111]: E0209 19:53:49.875825 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.876211 kubelet[2111]: E0209 19:53:49.876188 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.876211 kubelet[2111]: W0209 19:53:49.876208 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.876349 kubelet[2111]: E0209 19:53:49.876245 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.880409 kubelet[2111]: E0209 19:53:49.880375 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.880409 kubelet[2111]: W0209 19:53:49.880405 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.880643 kubelet[2111]: E0209 19:53:49.880438 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.880804 kubelet[2111]: E0209 19:53:49.880781 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.880804 kubelet[2111]: W0209 19:53:49.880803 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.880946 kubelet[2111]: E0209 19:53:49.880821 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.883404 kubelet[2111]: E0209 19:53:49.883377 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.883404 kubelet[2111]: W0209 19:53:49.883399 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.883608 kubelet[2111]: E0209 19:53:49.883529 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.884819 kubelet[2111]: E0209 19:53:49.884783 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.884819 kubelet[2111]: W0209 19:53:49.884818 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.885055 kubelet[2111]: E0209 19:53:49.884975 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.885350 kubelet[2111]: E0209 19:53:49.885328 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.885428 kubelet[2111]: W0209 19:53:49.885354 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.885509 kubelet[2111]: E0209 19:53:49.885481 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.885744 kubelet[2111]: E0209 19:53:49.885724 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.885744 kubelet[2111]: W0209 19:53:49.885742 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.885878 kubelet[2111]: E0209 19:53:49.885862 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.886116 kubelet[2111]: E0209 19:53:49.886096 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.886116 kubelet[2111]: W0209 19:53:49.886113 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.886331 kubelet[2111]: E0209 19:53:49.886309 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.887949 kubelet[2111]: E0209 19:53:49.887929 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.887949 kubelet[2111]: W0209 19:53:49.887946 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.888141 kubelet[2111]: E0209 19:53:49.888116 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.888428 kubelet[2111]: E0209 19:53:49.888408 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.888428 kubelet[2111]: W0209 19:53:49.888426 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.888637 kubelet[2111]: E0209 19:53:49.888609 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.888889 kubelet[2111]: E0209 19:53:49.888874 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.889020 kubelet[2111]: W0209 19:53:49.889004 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.889316 kubelet[2111]: E0209 19:53:49.889299 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.889528 kubelet[2111]: E0209 19:53:49.889505 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.889669 kubelet[2111]: W0209 19:53:49.889653 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.889810 kubelet[2111]: E0209 19:53:49.889789 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.890186 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.893725 kubelet[2111]: W0209 19:53:49.890203 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.890301 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.890468 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.893725 kubelet[2111]: W0209 19:53:49.890477 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.890580 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.890736 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.893725 kubelet[2111]: W0209 19:53:49.890746 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.890837 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.893725 kubelet[2111]: E0209 19:53:49.891007 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894324 kubelet[2111]: W0209 19:53:49.891019 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894324 kubelet[2111]: E0209 19:53:49.891124 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.894324 kubelet[2111]: E0209 19:53:49.891407 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894324 kubelet[2111]: W0209 19:53:49.891418 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894324 kubelet[2111]: E0209 19:53:49.891513 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.894324 kubelet[2111]: E0209 19:53:49.891696 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894324 kubelet[2111]: W0209 19:53:49.891705 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894324 kubelet[2111]: E0209 19:53:49.891807 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.894324 kubelet[2111]: E0209 19:53:49.892033 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894324 kubelet[2111]: W0209 19:53:49.892044 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.892198 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.892378 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894778 kubelet[2111]: W0209 19:53:49.892387 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.892497 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.892676 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894778 kubelet[2111]: W0209 19:53:49.892685 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.892795 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.892951 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.894778 kubelet[2111]: W0209 19:53:49.892962 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.894778 kubelet[2111]: E0209 19:53:49.893049 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.895264 kubelet[2111]: E0209 19:53:49.893246 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.895264 kubelet[2111]: W0209 19:53:49.893257 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.895264 kubelet[2111]: E0209 19:53:49.893376 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.895264 kubelet[2111]: E0209 19:53:49.893622 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.895264 kubelet[2111]: W0209 19:53:49.893631 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.895264 kubelet[2111]: E0209 19:53:49.893647 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.984892 kubelet[2111]: E0209 19:53:49.984858 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.985175 kubelet[2111]: W0209 19:53:49.985153 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.985312 kubelet[2111]: E0209 19:53:49.985298 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.985782 kubelet[2111]: E0209 19:53:49.985766 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.985943 kubelet[2111]: W0209 19:53:49.985927 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.986093 kubelet[2111]: E0209 19:53:49.986067 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:49.986512 kubelet[2111]: E0209 19:53:49.986497 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:49.986635 kubelet[2111]: W0209 19:53:49.986620 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:49.986771 kubelet[2111]: E0209 19:53:49.986758 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.088497 kubelet[2111]: E0209 19:53:50.088464 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.089204 kubelet[2111]: W0209 19:53:50.089176 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.089458 kubelet[2111]: E0209 19:53:50.089426 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.090516 kubelet[2111]: E0209 19:53:50.090495 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.090675 kubelet[2111]: W0209 19:53:50.090656 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.090831 kubelet[2111]: E0209 19:53:50.090816 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.092132 kubelet[2111]: E0209 19:53:50.092111 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.092311 kubelet[2111]: W0209 19:53:50.092291 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.092440 kubelet[2111]: E0209 19:53:50.092427 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.193407 kubelet[2111]: E0209 19:53:50.193290 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.193645 kubelet[2111]: W0209 19:53:50.193607 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.193805 kubelet[2111]: E0209 19:53:50.193785 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.194351 kubelet[2111]: E0209 19:53:50.194329 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.194533 kubelet[2111]: W0209 19:53:50.194511 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.194661 kubelet[2111]: E0209 19:53:50.194643 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.198585 kubelet[2111]: E0209 19:53:50.198564 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.198744 kubelet[2111]: W0209 19:53:50.198725 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.198873 kubelet[2111]: E0209 19:53:50.198857 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.242272 kubelet[2111]: E0209 19:53:50.242238 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.242533 kubelet[2111]: W0209 19:53:50.242506 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.242668 kubelet[2111]: E0209 19:53:50.242652 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.275063 env[1154]: time="2024-02-09T19:53:50.274501038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cc9b9bcd-ddsks,Uid:d936749e-0bef-4bbc-bf16-31185d6196b7,Namespace:calico-system,Attempt:0,}" Feb 9 19:53:50.299774 kubelet[2111]: E0209 19:53:50.299742 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.300005 kubelet[2111]: W0209 19:53:50.299979 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.300218 kubelet[2111]: E0209 19:53:50.300196 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.300789 kubelet[2111]: E0209 19:53:50.300767 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.300960 kubelet[2111]: W0209 19:53:50.300939 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.301127 kubelet[2111]: E0209 19:53:50.301109 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.308405 env[1154]: time="2024-02-09T19:53:50.308302977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:50.308572 env[1154]: time="2024-02-09T19:53:50.308427907Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:50.308572 env[1154]: time="2024-02-09T19:53:50.308468148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:50.308742 env[1154]: time="2024-02-09T19:53:50.308689992Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873 pid=2629 runtime=io.containerd.runc.v2 Feb 9 19:53:50.346587 systemd[1]: Started cri-containerd-ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873.scope. Feb 9 19:53:50.406509 kubelet[2111]: E0209 19:53:50.406201 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.406509 kubelet[2111]: W0209 19:53:50.406238 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.406509 kubelet[2111]: E0209 19:53:50.406275 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.406856 kubelet[2111]: E0209 19:53:50.406717 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.406856 kubelet[2111]: W0209 19:53:50.406736 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.406856 kubelet[2111]: E0209 19:53:50.406764 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.465302 kernel: kauditd_printk_skb: 348 callbacks suppressed Feb 9 19:53:50.465505 kernel: audit: type=1400 audit(1707508430.437:1015): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.480865 kubelet[2111]: E0209 19:53:50.480830 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.481157 kubelet[2111]: W0209 19:53:50.481129 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.481301 kubelet[2111]: E0209 19:53:50.481284 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.506114 kernel: audit: type=1400 audit(1707508430.437:1016): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.507931 kubelet[2111]: E0209 19:53:50.507885 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.507931 kubelet[2111]: W0209 19:53:50.507927 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.508182 kubelet[2111]: E0209 19:53:50.507958 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.541107 kernel: audit: type=1400 audit(1707508430.437:1017): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.541353 env[1154]: time="2024-02-09T19:53:50.536886651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5cc9b9bcd-ddsks,Uid:d936749e-0bef-4bbc-bf16-31185d6196b7,Namespace:calico-system,Attempt:0,} returns sandbox id \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\"" Feb 9 19:53:50.541353 env[1154]: time="2024-02-09T19:53:50.539564676Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.579198 kernel: audit: type=1400 audit(1707508430.437:1018): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.613235 kernel: audit: type=1400 audit(1707508430.437:1019): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.613299 kubelet[2111]: E0209 19:53:50.609634 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.613299 kubelet[2111]: W0209 19:53:50.609659 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.613299 kubelet[2111]: E0209 19:53:50.609698 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.636050 kernel: audit: type=1400 audit(1707508430.437:1020): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.662275 kernel: audit: type=1400 audit(1707508430.437:1021): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.662394 kubelet[2111]: E0209 19:53:50.660894 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:50.662394 kubelet[2111]: W0209 19:53:50.660920 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:50.662394 kubelet[2111]: E0209 19:53:50.660961 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.686110 kernel: audit: type=1400 audit(1707508430.437:1022): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.469000 audit[2668]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:50.715025 env[1154]: time="2024-02-09T19:53:50.714537328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-975p6,Uid:3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8,Namespace:calico-system,Attempt:0,}" Feb 9 19:53:50.724224 kernel: audit: type=1400 audit(1707508430.437:1023): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.724367 kernel: audit: type=1325 audit(1707508430.469:1024): table=filter:107 family=2 entries=14 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:50.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.469000 audit: BPF prog-id=130 op=LOAD Feb 9 19:53:50.469000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.469000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2629 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563313837363964386361626666656538663432666462366538353038 Feb 9 19:53:50.469000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.469000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2629 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563313837363964386361626666656538663432666462366538353038 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit: BPF prog-id=131 op=LOAD Feb 9 19:53:50.470000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003464d0 items=0 ppid=2629 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563313837363964386361626666656538663432666462366538353038 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit: BPF prog-id=132 op=LOAD Feb 9 19:53:50.470000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000346518 items=0 ppid=2629 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563313837363964386361626666656538663432666462366538353038 Feb 9 19:53:50.470000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:53:50.470000 audit: BPF prog-id=131 op=UNLOAD Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { perfmon } for pid=2640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit[2640]: AVC avc: denied { bpf } for pid=2640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.470000 audit: BPF prog-id=133 op=LOAD Feb 9 19:53:50.470000 audit[2640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000346928 items=0 ppid=2629 pid=2640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563313837363964386361626666656538663432666462366538353038 Feb 9 19:53:50.469000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff505673d0 a2=0 a3=7fff505673bc items=0 ppid=2323 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:50.483000 audit[2668]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:50.483000 audit[2668]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff505673d0 a2=0 a3=7fff505673bc items=0 ppid=2323 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:50.783400 env[1154]: time="2024-02-09T19:53:50.783300709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:50.783708 env[1154]: time="2024-02-09T19:53:50.783661784Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:50.783901 env[1154]: time="2024-02-09T19:53:50.783865661Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:50.784274 env[1154]: time="2024-02-09T19:53:50.784224793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5 pid=2689 runtime=io.containerd.runc.v2 Feb 9 19:53:50.852469 systemd[1]: Started cri-containerd-3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5.scope. Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.888000 audit: BPF prog-id=134 op=LOAD Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2689 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365636262663633393239346537346462346337343764343636636365 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2689 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365636262663633393239346537346462346337343764343636636365 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit: BPF prog-id=135 op=LOAD Feb 9 19:53:50.890000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001dd3b0 items=0 ppid=2689 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365636262663633393239346537346462346337343764343636636365 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.890000 audit: BPF prog-id=136 op=LOAD Feb 9 19:53:50.890000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001dd3f8 items=0 ppid=2689 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365636262663633393239346537346462346337343764343636636365 Feb 9 19:53:50.890000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:53:50.891000 audit: BPF prog-id=135 op=UNLOAD Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:50.891000 audit: BPF prog-id=137 op=LOAD Feb 9 19:53:50.891000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001dd808 items=0 ppid=2689 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:50.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365636262663633393239346537346462346337343764343636636365 Feb 9 19:53:50.913273 env[1154]: time="2024-02-09T19:53:50.913204579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-975p6,Uid:3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8,Namespace:calico-system,Attempt:0,} returns sandbox id \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\"" Feb 9 19:53:51.005969 kubelet[2111]: E0209 19:53:51.005829 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:53:51.577694 systemd[1]: run-containerd-runc-k8s.io-3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5-runc.s4AoTI.mount: Deactivated successfully. Feb 9 19:53:51.620746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount450857742.mount: Deactivated successfully. Feb 9 19:53:51.942000 audit[2748]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:51.942000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffea463aee0 a2=0 a3=7ffea463aecc items=0 ppid=2323 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:51.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:51.944000 audit[2748]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:51.944000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffea463aee0 a2=0 a3=7ffea463aecc items=0 ppid=2323 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:51.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:53.004340 kubelet[2111]: E0209 19:53:53.004288 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:53:53.391999 env[1154]: time="2024-02-09T19:53:53.391833911Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:53.395879 env[1154]: time="2024-02-09T19:53:53.394976259Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:53.402179 env[1154]: time="2024-02-09T19:53:53.401243707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:53.404816 env[1154]: time="2024-02-09T19:53:53.404767043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:53.405561 env[1154]: time="2024-02-09T19:53:53.405496759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 9 19:53:53.421737 env[1154]: time="2024-02-09T19:53:53.421683691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:53:53.434371 env[1154]: time="2024-02-09T19:53:53.434314728Z" level=info msg="CreateContainer within sandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:53:53.459894 env[1154]: time="2024-02-09T19:53:53.459833528Z" level=info msg="CreateContainer within sandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\"" Feb 9 19:53:53.461321 env[1154]: time="2024-02-09T19:53:53.461276341Z" level=info msg="StartContainer for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\"" Feb 9 19:53:53.518210 systemd[1]: Started cri-containerd-a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096.scope. Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.662000 audit: BPF prog-id=138 op=LOAD Feb 9 19:53:53.663000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.663000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2629 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:53.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326437316535393266343732383834666436306666373561373265 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2629 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326437316535393266343732383834666436306666373561373265 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.665000 audit: BPF prog-id=139 op=LOAD Feb 9 19:53:53.665000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001ca090 items=0 ppid=2629 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:53.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326437316535393266343732383834666436306666373561373265 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.667000 audit: BPF prog-id=140 op=LOAD Feb 9 19:53:53.667000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001ca0d8 items=0 ppid=2629 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:53.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326437316535393266343732383834666436306666373561373265 Feb 9 19:53:53.668000 audit: BPF prog-id=140 op=UNLOAD Feb 9 19:53:53.668000 audit: BPF prog-id=139 op=UNLOAD Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { perfmon } for pid=2759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit[2759]: AVC avc: denied { bpf } for pid=2759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:53.668000 audit: BPF prog-id=141 op=LOAD Feb 9 19:53:53.668000 audit[2759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001ca4e8 items=0 ppid=2629 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:53.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137326437316535393266343732383834666436306666373561373265 Feb 9 19:53:53.745926 env[1154]: time="2024-02-09T19:53:53.745833773Z" level=info msg="StartContainer for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" returns successfully" Feb 9 19:53:54.076687 env[1154]: time="2024-02-09T19:53:54.076630516Z" level=info msg="StopContainer for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" with timeout 300 (s)" Feb 9 19:53:54.077346 env[1154]: time="2024-02-09T19:53:54.077288008Z" level=info msg="Stop container \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" with signal terminated" Feb 9 19:53:54.097066 kubelet[2111]: I0209 19:53:54.097020 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5cc9b9bcd-ddsks" podStartSLOduration=-9.22337203175782e+09 pod.CreationTimestamp="2024-02-09 19:53:49 +0000 UTC" firstStartedPulling="2024-02-09 19:53:50.538835731 +0000 UTC m=+22.038771940" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:54.094150645 +0000 UTC m=+25.594086879" watchObservedRunningTime="2024-02-09 19:53:54.096954846 +0000 UTC m=+25.596891079" Feb 9 19:53:54.100000 audit: BPF prog-id=138 op=UNLOAD Feb 9 19:53:54.100744 systemd[1]: cri-containerd-a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096.scope: Deactivated successfully. Feb 9 19:53:54.103000 audit: BPF prog-id=141 op=UNLOAD Feb 9 19:53:54.417035 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096-rootfs.mount: Deactivated successfully. Feb 9 19:53:54.617096 env[1154]: time="2024-02-09T19:53:54.616977478Z" level=info msg="shim disconnected" id=a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096 Feb 9 19:53:54.617096 env[1154]: time="2024-02-09T19:53:54.617063748Z" level=warning msg="cleaning up after shim disconnected" id=a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096 namespace=k8s.io Feb 9 19:53:54.617096 env[1154]: time="2024-02-09T19:53:54.617103948Z" level=info msg="cleaning up dead shim" Feb 9 19:53:54.630124 env[1154]: time="2024-02-09T19:53:54.630049757Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:53:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2809 runtime=io.containerd.runc.v2\n" Feb 9 19:53:54.632724 env[1154]: time="2024-02-09T19:53:54.632650083Z" level=info msg="StopContainer for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" returns successfully" Feb 9 19:53:54.633764 env[1154]: time="2024-02-09T19:53:54.633719174Z" level=info msg="StopPodSandbox for \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\"" Feb 9 19:53:54.633902 env[1154]: time="2024-02-09T19:53:54.633805847Z" level=info msg="Container to stop \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 19:53:54.637055 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873-shm.mount: Deactivated successfully. Feb 9 19:53:54.657954 systemd[1]: cri-containerd-ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873.scope: Deactivated successfully. Feb 9 19:53:54.657000 audit: BPF prog-id=130 op=UNLOAD Feb 9 19:53:54.661000 audit: BPF prog-id=133 op=UNLOAD Feb 9 19:53:54.702046 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873-rootfs.mount: Deactivated successfully. Feb 9 19:53:54.713961 env[1154]: time="2024-02-09T19:53:54.713899656Z" level=info msg="shim disconnected" id=ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873 Feb 9 19:53:54.714373 env[1154]: time="2024-02-09T19:53:54.714338520Z" level=warning msg="cleaning up after shim disconnected" id=ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873 namespace=k8s.io Feb 9 19:53:54.714557 env[1154]: time="2024-02-09T19:53:54.714533600Z" level=info msg="cleaning up dead shim" Feb 9 19:53:54.727938 env[1154]: time="2024-02-09T19:53:54.727855919Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:53:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2840 runtime=io.containerd.runc.v2\ntime=\"2024-02-09T19:53:54Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Feb 9 19:53:54.728444 env[1154]: time="2024-02-09T19:53:54.728391156Z" level=info msg="TearDown network for sandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" successfully" Feb 9 19:53:54.728444 env[1154]: time="2024-02-09T19:53:54.728430960Z" level=info msg="StopPodSandbox for \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" returns successfully" Feb 9 19:53:54.842467 kubelet[2111]: E0209 19:53:54.840912 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:54.842467 kubelet[2111]: W0209 19:53:54.840954 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:54.842467 kubelet[2111]: E0209 19:53:54.841004 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:54.842467 kubelet[2111]: I0209 19:53:54.841061 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9fmfq\" (UniqueName: \"kubernetes.io/projected/d936749e-0bef-4bbc-bf16-31185d6196b7-kube-api-access-9fmfq\") pod \"d936749e-0bef-4bbc-bf16-31185d6196b7\" (UID: \"d936749e-0bef-4bbc-bf16-31185d6196b7\") " Feb 9 19:53:54.842467 kubelet[2111]: E0209 19:53:54.841476 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:54.842467 kubelet[2111]: W0209 19:53:54.841491 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:54.842467 kubelet[2111]: E0209 19:53:54.841515 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:54.842467 kubelet[2111]: I0209 19:53:54.841551 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d936749e-0bef-4bbc-bf16-31185d6196b7-typha-certs\") pod \"d936749e-0bef-4bbc-bf16-31185d6196b7\" (UID: \"d936749e-0bef-4bbc-bf16-31185d6196b7\") " Feb 9 19:53:54.842467 kubelet[2111]: E0209 19:53:54.841861 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:54.845427 kubelet[2111]: W0209 19:53:54.841872 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:54.845427 kubelet[2111]: E0209 19:53:54.841903 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:54.845427 kubelet[2111]: I0209 19:53:54.841946 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d936749e-0bef-4bbc-bf16-31185d6196b7-tigera-ca-bundle\") pod \"d936749e-0bef-4bbc-bf16-31185d6196b7\" (UID: \"d936749e-0bef-4bbc-bf16-31185d6196b7\") " Feb 9 19:53:54.845427 kubelet[2111]: E0209 19:53:54.845049 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:54.845427 kubelet[2111]: W0209 19:53:54.845086 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:54.845427 kubelet[2111]: E0209 19:53:54.845303 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:54.853769 systemd[1]: var-lib-kubelet-pods-d936749e\x2d0bef\x2d4bbc\x2dbf16\x2d31185d6196b7-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Feb 9 19:53:54.857031 kubelet[2111]: E0209 19:53:54.857001 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:54.857686 kubelet[2111]: W0209 19:53:54.857241 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:54.857686 kubelet[2111]: E0209 19:53:54.857280 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:54.859599 kubelet[2111]: E0209 19:53:54.859546 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:54.860628 kubelet[2111]: W0209 19:53:54.859712 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:54.860628 kubelet[2111]: E0209 19:53:54.859743 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:54.861110 kubelet[2111]: W0209 19:53:54.860985 2111 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/d936749e-0bef-4bbc-bf16-31185d6196b7/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 19:53:54.861905 kubelet[2111]: I0209 19:53:54.861821 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d936749e-0bef-4bbc-bf16-31185d6196b7-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "d936749e-0bef-4bbc-bf16-31185d6196b7" (UID: "d936749e-0bef-4bbc-bf16-31185d6196b7"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 19:53:54.869914 systemd[1]: var-lib-kubelet-pods-d936749e\x2d0bef\x2d4bbc\x2dbf16\x2d31185d6196b7-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9fmfq.mount: Deactivated successfully. Feb 9 19:53:54.875839 kubelet[2111]: I0209 19:53:54.874308 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d936749e-0bef-4bbc-bf16-31185d6196b7-kube-api-access-9fmfq" (OuterVolumeSpecName: "kube-api-access-9fmfq") pod "d936749e-0bef-4bbc-bf16-31185d6196b7" (UID: "d936749e-0bef-4bbc-bf16-31185d6196b7"). InnerVolumeSpecName "kube-api-access-9fmfq". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 19:53:54.880297 kubelet[2111]: I0209 19:53:54.880150 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d936749e-0bef-4bbc-bf16-31185d6196b7-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "d936749e-0bef-4bbc-bf16-31185d6196b7" (UID: "d936749e-0bef-4bbc-bf16-31185d6196b7"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 19:53:54.942711 kubelet[2111]: I0209 19:53:54.942662 2111 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-9fmfq\" (UniqueName: \"kubernetes.io/projected/d936749e-0bef-4bbc-bf16-31185d6196b7-kube-api-access-9fmfq\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:54.942711 kubelet[2111]: I0209 19:53:54.942709 2111 reconciler_common.go:295] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d936749e-0bef-4bbc-bf16-31185d6196b7-typha-certs\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:54.942987 kubelet[2111]: I0209 19:53:54.942728 2111 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d936749e-0bef-4bbc-bf16-31185d6196b7-tigera-ca-bundle\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:55.016406 kubelet[2111]: E0209 19:53:55.014489 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:53:55.025259 systemd[1]: Removed slice kubepods-besteffort-podd936749e_0bef_4bbc_bf16_31185d6196b7.slice. Feb 9 19:53:55.080657 kubelet[2111]: I0209 19:53:55.080626 2111 scope.go:115] "RemoveContainer" containerID="a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096" Feb 9 19:53:55.083738 env[1154]: time="2024-02-09T19:53:55.083115253Z" level=info msg="RemoveContainer for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\"" Feb 9 19:53:55.092964 env[1154]: time="2024-02-09T19:53:55.092911698Z" level=info msg="RemoveContainer for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" returns successfully" Feb 9 19:53:55.095173 kubelet[2111]: I0209 19:53:55.095129 2111 scope.go:115] "RemoveContainer" containerID="a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096" Feb 9 19:53:55.095954 env[1154]: time="2024-02-09T19:53:55.095845573Z" level=error msg="ContainerStatus for \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\": not found" Feb 9 19:53:55.096154 kubelet[2111]: E0209 19:53:55.096121 2111 remote_runtime.go:415] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\": not found" containerID="a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096" Feb 9 19:53:55.096284 kubelet[2111]: I0209 19:53:55.096176 2111 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={Type:containerd ID:a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096} err="failed to get container status \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\": rpc error: code = NotFound desc = an error occurred when try to find container \"a72d71e592f472884fd60ff75a72eb57fabe25eaff92fed13bbdb150b28e3096\": not found" Feb 9 19:53:55.133469 kubelet[2111]: I0209 19:53:55.133423 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:55.134014 kubelet[2111]: E0209 19:53:55.133506 2111 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="d936749e-0bef-4bbc-bf16-31185d6196b7" containerName="calico-typha" Feb 9 19:53:55.134014 kubelet[2111]: I0209 19:53:55.133548 2111 memory_manager.go:346] "RemoveStaleState removing state" podUID="d936749e-0bef-4bbc-bf16-31185d6196b7" containerName="calico-typha" Feb 9 19:53:55.143173 systemd[1]: Created slice kubepods-besteffort-pod6b35f133_9c22_41f6_ba8a_cfa027bbda43.slice. Feb 9 19:53:55.217703 kubelet[2111]: E0209 19:53:55.217661 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.217703 kubelet[2111]: W0209 19:53:55.217696 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.218017 kubelet[2111]: E0209 19:53:55.217729 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.218135 kubelet[2111]: E0209 19:53:55.218036 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.218135 kubelet[2111]: W0209 19:53:55.218051 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.218135 kubelet[2111]: E0209 19:53:55.218090 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.218402 kubelet[2111]: E0209 19:53:55.218366 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.218402 kubelet[2111]: W0209 19:53:55.218389 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.218548 kubelet[2111]: E0209 19:53:55.218409 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.218803 kubelet[2111]: E0209 19:53:55.218778 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.218803 kubelet[2111]: W0209 19:53:55.218801 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.219099 kubelet[2111]: E0209 19:53:55.218821 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.219183 kubelet[2111]: E0209 19:53:55.219103 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.219183 kubelet[2111]: W0209 19:53:55.219117 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.219183 kubelet[2111]: E0209 19:53:55.219136 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.219411 kubelet[2111]: E0209 19:53:55.219388 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.219411 kubelet[2111]: W0209 19:53:55.219410 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.219547 kubelet[2111]: E0209 19:53:55.219427 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.219815 kubelet[2111]: E0209 19:53:55.219790 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.219815 kubelet[2111]: W0209 19:53:55.219813 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.220009 kubelet[2111]: E0209 19:53:55.219833 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.220123 kubelet[2111]: E0209 19:53:55.220102 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.220123 kubelet[2111]: W0209 19:53:55.220120 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.220264 kubelet[2111]: E0209 19:53:55.220139 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.223431 kubelet[2111]: E0209 19:53:55.223406 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.223431 kubelet[2111]: W0209 19:53:55.223427 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.223633 kubelet[2111]: E0209 19:53:55.223448 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.245637 kubelet[2111]: E0209 19:53:55.245267 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.245637 kubelet[2111]: W0209 19:53:55.245295 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.245637 kubelet[2111]: E0209 19:53:55.245377 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.245637 kubelet[2111]: I0209 19:53:55.245445 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6b35f133-9c22-41f6-ba8a-cfa027bbda43-tigera-ca-bundle\") pod \"calico-typha-7b79f65b58-jznpp\" (UID: \"6b35f133-9c22-41f6-ba8a-cfa027bbda43\") " pod="calico-system/calico-typha-7b79f65b58-jznpp" Feb 9 19:53:55.248247 kubelet[2111]: E0209 19:53:55.247197 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.248247 kubelet[2111]: W0209 19:53:55.247222 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.248247 kubelet[2111]: E0209 19:53:55.247287 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.248247 kubelet[2111]: I0209 19:53:55.247330 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6g5s2\" (UniqueName: \"kubernetes.io/projected/6b35f133-9c22-41f6-ba8a-cfa027bbda43-kube-api-access-6g5s2\") pod \"calico-typha-7b79f65b58-jznpp\" (UID: \"6b35f133-9c22-41f6-ba8a-cfa027bbda43\") " pod="calico-system/calico-typha-7b79f65b58-jznpp" Feb 9 19:53:55.248247 kubelet[2111]: E0209 19:53:55.247672 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.248247 kubelet[2111]: W0209 19:53:55.247689 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.248247 kubelet[2111]: E0209 19:53:55.247712 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.248247 kubelet[2111]: E0209 19:53:55.248033 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.248247 kubelet[2111]: W0209 19:53:55.248046 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.248833 kubelet[2111]: E0209 19:53:55.248067 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.249754 kubelet[2111]: E0209 19:53:55.249151 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.249754 kubelet[2111]: W0209 19:53:55.249168 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.249754 kubelet[2111]: E0209 19:53:55.249190 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.250350 kubelet[2111]: E0209 19:53:55.250154 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.250350 kubelet[2111]: W0209 19:53:55.250171 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.250350 kubelet[2111]: E0209 19:53:55.250209 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.250800 kubelet[2111]: E0209 19:53:55.250783 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.250940 kubelet[2111]: W0209 19:53:55.250922 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.251064 kubelet[2111]: E0209 19:53:55.251050 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.251229 kubelet[2111]: I0209 19:53:55.251214 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6b35f133-9c22-41f6-ba8a-cfa027bbda43-typha-certs\") pod \"calico-typha-7b79f65b58-jznpp\" (UID: \"6b35f133-9c22-41f6-ba8a-cfa027bbda43\") " pod="calico-system/calico-typha-7b79f65b58-jznpp" Feb 9 19:53:55.251620 kubelet[2111]: E0209 19:53:55.251604 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.251755 kubelet[2111]: W0209 19:53:55.251738 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.251893 kubelet[2111]: E0209 19:53:55.251874 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.252314 kubelet[2111]: E0209 19:53:55.252296 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.252451 kubelet[2111]: W0209 19:53:55.252433 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.252561 kubelet[2111]: E0209 19:53:55.252548 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.357550 kubelet[2111]: E0209 19:53:55.353690 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.357550 kubelet[2111]: W0209 19:53:55.353731 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.357550 kubelet[2111]: E0209 19:53:55.353760 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.358307 kubelet[2111]: E0209 19:53:55.357984 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.358307 kubelet[2111]: W0209 19:53:55.358018 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.358307 kubelet[2111]: E0209 19:53:55.358050 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.358624 kubelet[2111]: E0209 19:53:55.358477 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.358624 kubelet[2111]: W0209 19:53:55.358501 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.358624 kubelet[2111]: E0209 19:53:55.358527 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.358871 kubelet[2111]: E0209 19:53:55.358847 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.358871 kubelet[2111]: W0209 19:53:55.358870 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.359053 kubelet[2111]: E0209 19:53:55.358899 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.359189 kubelet[2111]: E0209 19:53:55.359169 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.359189 kubelet[2111]: W0209 19:53:55.359188 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.359346 kubelet[2111]: E0209 19:53:55.359211 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.359505 kubelet[2111]: E0209 19:53:55.359480 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.359505 kubelet[2111]: W0209 19:53:55.359504 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.359653 kubelet[2111]: E0209 19:53:55.359529 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.359843 kubelet[2111]: E0209 19:53:55.359823 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.359843 kubelet[2111]: W0209 19:53:55.359842 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.360027 kubelet[2111]: E0209 19:53:55.359860 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.362354 kubelet[2111]: E0209 19:53:55.362166 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.362354 kubelet[2111]: W0209 19:53:55.362186 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.362354 kubelet[2111]: E0209 19:53:55.362220 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.362609 kubelet[2111]: E0209 19:53:55.362585 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.362609 kubelet[2111]: W0209 19:53:55.362602 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.362739 kubelet[2111]: E0209 19:53:55.362731 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.362936 kubelet[2111]: E0209 19:53:55.362915 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.362936 kubelet[2111]: W0209 19:53:55.362936 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.363125 kubelet[2111]: E0209 19:53:55.362959 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.363315 kubelet[2111]: E0209 19:53:55.363294 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.363406 kubelet[2111]: W0209 19:53:55.363315 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.363406 kubelet[2111]: E0209 19:53:55.363339 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.363788 kubelet[2111]: E0209 19:53:55.363763 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.363788 kubelet[2111]: W0209 19:53:55.363787 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.363970 kubelet[2111]: E0209 19:53:55.363814 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.364194 kubelet[2111]: E0209 19:53:55.364174 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.364194 kubelet[2111]: W0209 19:53:55.364193 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.364354 kubelet[2111]: E0209 19:53:55.364312 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.369556 kubelet[2111]: E0209 19:53:55.364878 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.369556 kubelet[2111]: W0209 19:53:55.364898 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.369556 kubelet[2111]: E0209 19:53:55.364918 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.369556 kubelet[2111]: E0209 19:53:55.365303 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.369556 kubelet[2111]: W0209 19:53:55.365317 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.369556 kubelet[2111]: E0209 19:53:55.365347 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.369973 kubelet[2111]: E0209 19:53:55.369622 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.369973 kubelet[2111]: W0209 19:53:55.369638 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.369973 kubelet[2111]: E0209 19:53:55.369663 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.373849 kubelet[2111]: E0209 19:53:55.373818 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.373849 kubelet[2111]: W0209 19:53:55.373844 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.374053 kubelet[2111]: E0209 19:53:55.373867 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.390725 kubelet[2111]: E0209 19:53:55.390692 2111 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:53:55.391241 kubelet[2111]: W0209 19:53:55.391207 2111 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:53:55.392602 kubelet[2111]: E0209 19:53:55.391348 2111 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:53:55.420453 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount317685018.mount: Deactivated successfully. Feb 9 19:53:55.420602 systemd[1]: var-lib-kubelet-pods-d936749e\x2d0bef\x2d4bbc\x2dbf16\x2d31185d6196b7-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Feb 9 19:53:55.451868 env[1154]: time="2024-02-09T19:53:55.451804135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b79f65b58-jznpp,Uid:6b35f133-9c22-41f6-ba8a-cfa027bbda43,Namespace:calico-system,Attempt:0,}" Feb 9 19:53:55.452000 audit[2925]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:55.459011 kernel: kauditd_printk_skb: 177 callbacks suppressed Feb 9 19:53:55.459175 kernel: audit: type=1325 audit(1707508435.452:1077): table=filter:111 family=2 entries=14 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:55.452000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffca00fc270 a2=0 a3=7ffca00fc25c items=0 ppid=2323 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.495349 env[1154]: time="2024-02-09T19:53:55.495153039Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:55.495584 env[1154]: time="2024-02-09T19:53:55.495548126Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:55.495753 env[1154]: time="2024-02-09T19:53:55.495721789Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:55.496234 env[1154]: time="2024-02-09T19:53:55.496188308Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/355c8c4438aad4bfe31b70a60c7ecaba4d399d3c46fdf27d8ffe23f6cc0b20d5 pid=2933 runtime=io.containerd.runc.v2 Feb 9 19:53:55.516204 kernel: audit: type=1300 audit(1707508435.452:1077): arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffca00fc270 a2=0 a3=7ffca00fc25c items=0 ppid=2323 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:55.536986 kernel: audit: type=1327 audit(1707508435.452:1077): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:55.453000 audit[2925]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:55.562269 kernel: audit: type=1325 audit(1707508435.453:1078): table=nat:112 family=2 entries=20 op=nft_register_rule pid=2925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:55.453000 audit[2925]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffca00fc270 a2=0 a3=7ffca00fc25c items=0 ppid=2323 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.604045 kernel: audit: type=1300 audit(1707508435.453:1078): arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffca00fc270 a2=0 a3=7ffca00fc25c items=0 ppid=2323 pid=2925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.617291 systemd[1]: Started cri-containerd-355c8c4438aad4bfe31b70a60c7ecaba4d399d3c46fdf27d8ffe23f6cc0b20d5.scope. Feb 9 19:53:55.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:55.635179 kernel: audit: type=1327 audit(1707508435.453:1078): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690588 kernel: audit: type=1400 audit(1707508435.667:1079): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.723171 kernel: audit: type=1400 audit(1707508435.667:1080): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.755232 kernel: audit: type=1400 audit(1707508435.667:1081): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.782199 kernel: audit: type=1400 audit(1707508435.667:1082): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.667000 audit: BPF prog-id=142 op=LOAD Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2933 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356338633434333861616434626665333162373061363063376563 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2933 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356338633434333861616434626665333162373061363063376563 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.668000 audit: BPF prog-id=143 op=LOAD Feb 9 19:53:55.668000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000386340 items=0 ppid=2933 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356338633434333861616434626665333162373061363063376563 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit: BPF prog-id=144 op=LOAD Feb 9 19:53:55.690000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000386388 items=0 ppid=2933 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356338633434333861616434626665333162373061363063376563 Feb 9 19:53:55.690000 audit: BPF prog-id=144 op=UNLOAD Feb 9 19:53:55.690000 audit: BPF prog-id=143 op=UNLOAD Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { perfmon } for pid=2945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit[2945]: AVC avc: denied { bpf } for pid=2945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:55.690000 audit: BPF prog-id=145 op=LOAD Feb 9 19:53:55.690000 audit[2945]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000386798 items=0 ppid=2933 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335356338633434333861616434626665333162373061363063376563 Feb 9 19:53:55.872879 env[1154]: time="2024-02-09T19:53:55.872727978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b79f65b58-jznpp,Uid:6b35f133-9c22-41f6-ba8a-cfa027bbda43,Namespace:calico-system,Attempt:0,} returns sandbox id \"355c8c4438aad4bfe31b70a60c7ecaba4d399d3c46fdf27d8ffe23f6cc0b20d5\"" Feb 9 19:53:55.903900 env[1154]: time="2024-02-09T19:53:55.903841111Z" level=info msg="CreateContainer within sandbox \"355c8c4438aad4bfe31b70a60c7ecaba4d399d3c46fdf27d8ffe23f6cc0b20d5\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 9 19:53:55.917000 audit[2993]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:55.917000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffff0317110 a2=0 a3=7ffff03170fc items=0 ppid=2323 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:55.919000 audit[2993]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:53:55.919000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffff0317110 a2=0 a3=7ffff03170fc items=0 ppid=2323 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:55.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:53:55.933461 env[1154]: time="2024-02-09T19:53:55.933397875Z" level=info msg="CreateContainer within sandbox \"355c8c4438aad4bfe31b70a60c7ecaba4d399d3c46fdf27d8ffe23f6cc0b20d5\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b0e2073376bfdc0c83fa2e8777046df676f57fc5fd575b21515689291a1134bc\"" Feb 9 19:53:55.934431 env[1154]: time="2024-02-09T19:53:55.934375252Z" level=info msg="StartContainer for \"b0e2073376bfdc0c83fa2e8777046df676f57fc5fd575b21515689291a1134bc\"" Feb 9 19:53:55.939037 env[1154]: time="2024-02-09T19:53:55.938972757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:55.945048 env[1154]: time="2024-02-09T19:53:55.944122810Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:55.948774 env[1154]: time="2024-02-09T19:53:55.948720935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:55.953103 env[1154]: time="2024-02-09T19:53:55.953031193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:53:55.955193 env[1154]: time="2024-02-09T19:53:55.955124534Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:53:55.961600 env[1154]: time="2024-02-09T19:53:55.961526658Z" level=info msg="CreateContainer within sandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:53:55.986284 env[1154]: time="2024-02-09T19:53:55.986175021Z" level=info msg="CreateContainer within sandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4\"" Feb 9 19:53:55.987343 env[1154]: time="2024-02-09T19:53:55.987291165Z" level=info msg="StartContainer for \"aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4\"" Feb 9 19:53:56.008650 systemd[1]: Started cri-containerd-b0e2073376bfdc0c83fa2e8777046df676f57fc5fd575b21515689291a1134bc.scope. Feb 9 19:53:56.055638 systemd[1]: Started cri-containerd-aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4.scope. Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.078000 audit: BPF prog-id=146 op=LOAD Feb 9 19:53:56.080000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.080000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2933 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653230373333373662666463306338336661326538373737303436 Feb 9 19:53:56.082000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.082000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2933 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653230373333373662666463306338336661326538373737303436 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.084000 audit: BPF prog-id=147 op=LOAD Feb 9 19:53:56.084000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000292800 items=0 ppid=2933 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653230373333373662666463306338336661326538373737303436 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.085000 audit: BPF prog-id=148 op=LOAD Feb 9 19:53:56.085000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000292848 items=0 ppid=2933 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653230373333373662666463306338336661326538373737303436 Feb 9 19:53:56.087000 audit: BPF prog-id=148 op=UNLOAD Feb 9 19:53:56.087000 audit: BPF prog-id=147 op=UNLOAD Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.087000 audit: BPF prog-id=149 op=LOAD Feb 9 19:53:56.087000 audit[3000]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000292c58 items=0 ppid=2933 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653230373333373662666463306338336661326538373737303436 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2689 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653336353862616463353739613938306537386537386236326362 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit: BPF prog-id=150 op=LOAD Feb 9 19:53:56.100000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027c170 items=0 ppid=2689 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653336353862616463353739613938306537386537386236326362 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit: BPF prog-id=151 op=LOAD Feb 9 19:53:56.100000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027c1b8 items=0 ppid=2689 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653336353862616463353739613938306537386537386236326362 Feb 9 19:53:56.100000 audit: BPF prog-id=151 op=UNLOAD Feb 9 19:53:56.100000 audit: BPF prog-id=150 op=UNLOAD Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { perfmon } for pid=3017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit[3017]: AVC avc: denied { bpf } for pid=3017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:56.100000 audit: BPF prog-id=152 op=LOAD Feb 9 19:53:56.100000 audit[3017]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027c248 items=0 ppid=2689 pid=3017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:56.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653336353862616463353739613938306537386537386236326362 Feb 9 19:53:56.143660 env[1154]: time="2024-02-09T19:53:56.143524797Z" level=info msg="StartContainer for \"aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4\" returns successfully" Feb 9 19:53:56.160003 env[1154]: time="2024-02-09T19:53:56.159932306Z" level=info msg="StartContainer for \"b0e2073376bfdc0c83fa2e8777046df676f57fc5fd575b21515689291a1134bc\" returns successfully" Feb 9 19:53:56.171319 systemd[1]: cri-containerd-aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4.scope: Deactivated successfully. Feb 9 19:53:56.173000 audit: BPF prog-id=152 op=UNLOAD Feb 9 19:53:56.271447 env[1154]: time="2024-02-09T19:53:56.271361234Z" level=info msg="shim disconnected" id=aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4 Feb 9 19:53:56.271447 env[1154]: time="2024-02-09T19:53:56.271429987Z" level=warning msg="cleaning up after shim disconnected" id=aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4 namespace=k8s.io Feb 9 19:53:56.271447 env[1154]: time="2024-02-09T19:53:56.271446512Z" level=info msg="cleaning up dead shim" Feb 9 19:53:56.299545 env[1154]: time="2024-02-09T19:53:56.299487522Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:53:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3077 runtime=io.containerd.runc.v2\n" Feb 9 19:53:56.421725 systemd[1]: run-containerd-runc-k8s.io-355c8c4438aad4bfe31b70a60c7ecaba4d399d3c46fdf27d8ffe23f6cc0b20d5-runc.EuzhpY.mount: Deactivated successfully. Feb 9 19:53:57.005951 kubelet[2111]: E0209 19:53:57.004442 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:53:57.008492 kubelet[2111]: I0209 19:53:57.008421 2111 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=d936749e-0bef-4bbc-bf16-31185d6196b7 path="/var/lib/kubelet/pods/d936749e-0bef-4bbc-bf16-31185d6196b7/volumes" Feb 9 19:53:57.092618 env[1154]: time="2024-02-09T19:53:57.092566633Z" level=info msg="StopPodSandbox for \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\"" Feb 9 19:53:57.093304 env[1154]: time="2024-02-09T19:53:57.093262876Z" level=info msg="Container to stop \"aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Feb 9 19:53:57.096954 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5-shm.mount: Deactivated successfully. Feb 9 19:53:57.105000 audit: BPF prog-id=134 op=UNLOAD Feb 9 19:53:57.106212 systemd[1]: cri-containerd-3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5.scope: Deactivated successfully. Feb 9 19:53:57.108000 audit: BPF prog-id=137 op=UNLOAD Feb 9 19:53:57.153285 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5-rootfs.mount: Deactivated successfully. Feb 9 19:53:57.162550 env[1154]: time="2024-02-09T19:53:57.162468674Z" level=info msg="shim disconnected" id=3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5 Feb 9 19:53:57.162550 env[1154]: time="2024-02-09T19:53:57.162540963Z" level=warning msg="cleaning up after shim disconnected" id=3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5 namespace=k8s.io Feb 9 19:53:57.162550 env[1154]: time="2024-02-09T19:53:57.162557605Z" level=info msg="cleaning up dead shim" Feb 9 19:53:57.177200 env[1154]: time="2024-02-09T19:53:57.177130960Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:53:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3114 runtime=io.containerd.runc.v2\n" Feb 9 19:53:57.177587 env[1154]: time="2024-02-09T19:53:57.177534616Z" level=info msg="TearDown network for sandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" successfully" Feb 9 19:53:57.177587 env[1154]: time="2024-02-09T19:53:57.177570873Z" level=info msg="StopPodSandbox for \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" returns successfully" Feb 9 19:53:57.273202 kubelet[2111]: I0209 19:53:57.271929 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-log-dir\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273202 kubelet[2111]: I0209 19:53:57.272001 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-flexvol-driver-host\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273202 kubelet[2111]: I0209 19:53:57.272041 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-node-certs\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273202 kubelet[2111]: I0209 19:53:57.272093 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-tigera-ca-bundle\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273202 kubelet[2111]: I0209 19:53:57.272124 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-lib-modules\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273202 kubelet[2111]: I0209 19:53:57.272151 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-lib-calico\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273746 kubelet[2111]: I0209 19:53:57.272196 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-net-dir\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273746 kubelet[2111]: I0209 19:53:57.272228 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-policysync\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273746 kubelet[2111]: I0209 19:53:57.272265 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"kube-api-access-s2zrp\" (UniqueName: \"kubernetes.io/projected/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-kube-api-access-s2zrp\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273746 kubelet[2111]: I0209 19:53:57.272297 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-xtables-lock\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273746 kubelet[2111]: I0209 19:53:57.272333 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-run-calico\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.273746 kubelet[2111]: I0209 19:53:57.272360 2111 reconciler_common.go:169] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-bin-dir\") pod \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\" (UID: \"3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8\") " Feb 9 19:53:57.274112 kubelet[2111]: I0209 19:53:57.272444 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.274112 kubelet[2111]: I0209 19:53:57.272502 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.274112 kubelet[2111]: I0209 19:53:57.272532 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.276094 kubelet[2111]: I0209 19:53:57.274344 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.276094 kubelet[2111]: W0209 19:53:57.274585 2111 empty_dir.go:525] Warning: Failed to clear quota on /var/lib/kubelet/pods/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8/volumes/kubernetes.io~configmap/tigera-ca-bundle: clearQuota called, but quotas disabled Feb 9 19:53:57.276094 kubelet[2111]: I0209 19:53:57.274932 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Feb 9 19:53:57.276094 kubelet[2111]: I0209 19:53:57.274982 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.276094 kubelet[2111]: I0209 19:53:57.275011 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.280601 kubelet[2111]: I0209 19:53:57.277140 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-node-certs" (OuterVolumeSpecName: "node-certs") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Feb 9 19:53:57.280601 kubelet[2111]: I0209 19:53:57.277195 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.280601 kubelet[2111]: I0209 19:53:57.277228 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.280601 kubelet[2111]: I0209 19:53:57.277256 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-policysync" (OuterVolumeSpecName: "policysync") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Feb 9 19:53:57.279703 systemd[1]: var-lib-kubelet-pods-3fc3eafe\x2dcfd6\x2d4a9e\x2db3d3\x2d94336245e4c8-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Feb 9 19:53:57.286562 systemd[1]: var-lib-kubelet-pods-3fc3eafe\x2dcfd6\x2d4a9e\x2db3d3\x2d94336245e4c8-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2ds2zrp.mount: Deactivated successfully. Feb 9 19:53:57.286823 kubelet[2111]: I0209 19:53:57.286567 2111 operation_generator.go:900] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-kube-api-access-s2zrp" (OuterVolumeSpecName: "kube-api-access-s2zrp") pod "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" (UID: "3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8"). InnerVolumeSpecName "kube-api-access-s2zrp". PluginName "kubernetes.io/projected", VolumeGidValue "" Feb 9 19:53:57.373209 kubelet[2111]: I0209 19:53:57.373158 2111 reconciler_common.go:295] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-policysync\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373235 2111 reconciler_common.go:295] "Volume detached for volume \"kube-api-access-s2zrp\" (UniqueName: \"kubernetes.io/projected/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-kube-api-access-s2zrp\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373262 2111 reconciler_common.go:295] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-xtables-lock\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373302 2111 reconciler_common.go:295] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-run-calico\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373320 2111 reconciler_common.go:295] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-bin-dir\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373338 2111 reconciler_common.go:295] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-log-dir\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373358 2111 reconciler_common.go:295] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-flexvol-driver-host\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373444 kubelet[2111]: I0209 19:53:57.373379 2111 reconciler_common.go:295] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-node-certs\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373727 kubelet[2111]: I0209 19:53:57.373398 2111 reconciler_common.go:295] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-tigera-ca-bundle\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373727 kubelet[2111]: I0209 19:53:57.373418 2111 reconciler_common.go:295] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-lib-modules\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373727 kubelet[2111]: I0209 19:53:57.373436 2111 reconciler_common.go:295] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-var-lib-calico\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:57.373727 kubelet[2111]: I0209 19:53:57.373455 2111 reconciler_common.go:295] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8-cni-net-dir\") on node \"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal\" DevicePath \"\"" Feb 9 19:53:58.107962 kubelet[2111]: I0209 19:53:58.107911 2111 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:53:58.109626 kubelet[2111]: I0209 19:53:58.109592 2111 scope.go:115] "RemoveContainer" containerID="aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4" Feb 9 19:53:58.114000 systemd[1]: Removed slice kubepods-besteffort-pod3fc3eafe_cfd6_4a9e_b3d3_94336245e4c8.slice. Feb 9 19:53:58.118362 env[1154]: time="2024-02-09T19:53:58.118315922Z" level=info msg="RemoveContainer for \"aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4\"" Feb 9 19:53:58.123924 env[1154]: time="2024-02-09T19:53:58.123873992Z" level=info msg="RemoveContainer for \"aee3658badc579a980e78e78b62cbb9985b1acab5de4a32e359e271be40ec9c4\" returns successfully" Feb 9 19:53:58.138421 kubelet[2111]: I0209 19:53:58.138382 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7b79f65b58-jznpp" podStartSLOduration=8.138330776 pod.CreationTimestamp="2024-02-09 19:53:50 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:53:57.153420552 +0000 UTC m=+28.653356786" watchObservedRunningTime="2024-02-09 19:53:58.138330776 +0000 UTC m=+29.638267008" Feb 9 19:53:58.163593 kubelet[2111]: I0209 19:53:58.163528 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:53:58.163593 kubelet[2111]: E0209 19:53:58.163602 2111 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" containerName="flexvol-driver" Feb 9 19:53:58.163895 kubelet[2111]: I0209 19:53:58.163638 2111 memory_manager.go:346] "RemoveStaleState removing state" podUID="3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8" containerName="flexvol-driver" Feb 9 19:53:58.171633 systemd[1]: Created slice kubepods-besteffort-pod5b16db11_03b9_4827_8799_a4a6416cab2d.slice. Feb 9 19:53:58.278394 kubelet[2111]: I0209 19:53:58.278344 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-policysync\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.278712 kubelet[2111]: I0209 19:53:58.278684 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/5b16db11-03b9-4827-8799-a4a6416cab2d-node-certs\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.278878 kubelet[2111]: I0209 19:53:58.278738 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-flexvol-driver-host\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.278878 kubelet[2111]: I0209 19:53:58.278775 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-cni-bin-dir\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.278878 kubelet[2111]: I0209 19:53:58.278809 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mjdt7\" (UniqueName: \"kubernetes.io/projected/5b16db11-03b9-4827-8799-a4a6416cab2d-kube-api-access-mjdt7\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.278878 kubelet[2111]: I0209 19:53:58.278856 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-var-lib-calico\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.279175 kubelet[2111]: I0209 19:53:58.278899 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5b16db11-03b9-4827-8799-a4a6416cab2d-tigera-ca-bundle\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.279175 kubelet[2111]: I0209 19:53:58.278944 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-lib-modules\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.279175 kubelet[2111]: I0209 19:53:58.278979 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-cni-net-dir\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.279175 kubelet[2111]: I0209 19:53:58.279019 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-xtables-lock\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.279175 kubelet[2111]: I0209 19:53:58.279053 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-var-run-calico\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.279445 kubelet[2111]: I0209 19:53:58.279120 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/5b16db11-03b9-4827-8799-a4a6416cab2d-cni-log-dir\") pod \"calico-node-lmwb9\" (UID: \"5b16db11-03b9-4827-8799-a4a6416cab2d\") " pod="calico-system/calico-node-lmwb9" Feb 9 19:53:58.477204 env[1154]: time="2024-02-09T19:53:58.477133206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lmwb9,Uid:5b16db11-03b9-4827-8799-a4a6416cab2d,Namespace:calico-system,Attempt:0,}" Feb 9 19:53:58.504859 env[1154]: time="2024-02-09T19:53:58.504769231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:53:58.505141 env[1154]: time="2024-02-09T19:53:58.504824442Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:53:58.505141 env[1154]: time="2024-02-09T19:53:58.504859868Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:53:58.506453 env[1154]: time="2024-02-09T19:53:58.505484338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b pid=3139 runtime=io.containerd.runc.v2 Feb 9 19:53:58.532966 systemd[1]: Started cri-containerd-8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b.scope. Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.573000 audit: BPF prog-id=153 op=LOAD Feb 9 19:53:58.574000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.574000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864396439363735306561613462393035353933653839346263633332 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864396439363735306561613462393035353933653839346263633332 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.575000 audit: BPF prog-id=154 op=LOAD Feb 9 19:53:58.575000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000259b0 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864396439363735306561613462393035353933653839346263633332 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.578000 audit: BPF prog-id=155 op=LOAD Feb 9 19:53:58.578000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000259f8 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864396439363735306561613462393035353933653839346263633332 Feb 9 19:53:58.580000 audit: BPF prog-id=155 op=UNLOAD Feb 9 19:53:58.580000 audit: BPF prog-id=154 op=UNLOAD Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.580000 audit: BPF prog-id=156 op=LOAD Feb 9 19:53:58.580000 audit[3149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025e08 items=0 ppid=3139 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864396439363735306561613462393035353933653839346263633332 Feb 9 19:53:58.615301 env[1154]: time="2024-02-09T19:53:58.615241124Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lmwb9,Uid:5b16db11-03b9-4827-8799-a4a6416cab2d,Namespace:calico-system,Attempt:0,} returns sandbox id \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\"" Feb 9 19:53:58.619363 env[1154]: time="2024-02-09T19:53:58.619290760Z" level=info msg="CreateContainer within sandbox \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:53:58.640566 env[1154]: time="2024-02-09T19:53:58.640493698Z" level=info msg="CreateContainer within sandbox \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100\"" Feb 9 19:53:58.641838 env[1154]: time="2024-02-09T19:53:58.641794020Z" level=info msg="StartContainer for \"39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100\"" Feb 9 19:53:58.676675 systemd[1]: Started cri-containerd-39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100.scope. Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3139 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656235316234666639363036643632366237346333396663333963 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.708000 audit: BPF prog-id=157 op=LOAD Feb 9 19:53:58.708000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000382060 items=0 ppid=3139 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656235316234666639363036643632366237346333396663333963 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit: BPF prog-id=158 op=LOAD Feb 9 19:53:58.709000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003820a8 items=0 ppid=3139 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656235316234666639363036643632366237346333396663333963 Feb 9 19:53:58.709000 audit: BPF prog-id=158 op=UNLOAD Feb 9 19:53:58.709000 audit: BPF prog-id=157 op=UNLOAD Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { perfmon } for pid=3181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit[3181]: AVC avc: denied { bpf } for pid=3181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:53:58.709000 audit: BPF prog-id=159 op=LOAD Feb 9 19:53:58.709000 audit[3181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000382138 items=0 ppid=3139 pid=3181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:53:58.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339656235316234666639363036643632366237346333396663333963 Feb 9 19:53:58.754730 env[1154]: time="2024-02-09T19:53:58.749829257Z" level=info msg="StartContainer for \"39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100\" returns successfully" Feb 9 19:53:58.786401 systemd[1]: cri-containerd-39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100.scope: Deactivated successfully. Feb 9 19:53:58.790000 audit: BPF prog-id=159 op=UNLOAD Feb 9 19:53:58.855629 env[1154]: time="2024-02-09T19:53:58.855556572Z" level=info msg="shim disconnected" id=39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100 Feb 9 19:53:58.855936 env[1154]: time="2024-02-09T19:53:58.855616672Z" level=warning msg="cleaning up after shim disconnected" id=39eb51b4ff9606d626b74c39fc39c0514cd08fe062eb4e41dd2cc2f8920e7100 namespace=k8s.io Feb 9 19:53:58.855936 env[1154]: time="2024-02-09T19:53:58.855651868Z" level=info msg="cleaning up dead shim" Feb 9 19:53:58.870497 env[1154]: time="2024-02-09T19:53:58.870421489Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:53:58Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3217 runtime=io.containerd.runc.v2\n" Feb 9 19:53:59.003822 kubelet[2111]: E0209 19:53:59.003767 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:53:59.011389 kubelet[2111]: I0209 19:53:59.010247 2111 kubelet_volumes.go:160] "Cleaned up orphaned pod volumes dir" podUID=3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8 path="/var/lib/kubelet/pods/3fc3eafe-cfd6-4a9e-b3d3-94336245e4c8/volumes" Feb 9 19:53:59.121110 env[1154]: time="2024-02-09T19:53:59.121038527Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:53:59.389697 systemd[1]: run-containerd-runc-k8s.io-8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b-runc.92xXcp.mount: Deactivated successfully. Feb 9 19:54:01.004120 kubelet[2111]: E0209 19:54:01.003842 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:54:03.004587 kubelet[2111]: E0209 19:54:03.004551 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:54:03.921403 env[1154]: time="2024-02-09T19:54:03.921336900Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:03.924632 env[1154]: time="2024-02-09T19:54:03.924581142Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:03.927533 env[1154]: time="2024-02-09T19:54:03.927490397Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:03.930914 env[1154]: time="2024-02-09T19:54:03.930874460Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:03.931913 env[1154]: time="2024-02-09T19:54:03.931863060Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:54:03.936611 env[1154]: time="2024-02-09T19:54:03.936550661Z" level=info msg="CreateContainer within sandbox \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:54:03.962659 env[1154]: time="2024-02-09T19:54:03.962583700Z" level=info msg="CreateContainer within sandbox \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51\"" Feb 9 19:54:03.964263 env[1154]: time="2024-02-09T19:54:03.964205711Z" level=info msg="StartContainer for \"034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51\"" Feb 9 19:54:04.006006 systemd[1]: run-containerd-runc-k8s.io-034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51-runc.BDFyvi.mount: Deactivated successfully. Feb 9 19:54:04.012383 systemd[1]: Started cri-containerd-034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51.scope. Feb 9 19:54:04.069489 kernel: kauditd_printk_skb: 263 callbacks suppressed Feb 9 19:54:04.069673 kernel: audit: type=1400 audit(1707508444.039:1151): avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3139 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:04.132226 kernel: audit: type=1300 audit(1707508444.039:1151): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3139 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:04.132457 kernel: audit: type=1327 audit(1707508444.039:1151): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346663383535633335333064643031363937303139373564393539 Feb 9 19:54:04.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346663383535633335333064643031363937303139373564393539 Feb 9 19:54:04.153898 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.154219 env[1154]: time="2024-02-09T19:54:04.135140184Z" level=info msg="StartContainer for \"034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51\" returns successfully" Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.176975 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.219708 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.219881 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.219933 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.285283 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.285454 kernel: audit: type=1400 audit(1707508444.039:1152): avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.039000 audit: BPF prog-id=160 op=LOAD Feb 9 19:54:04.039000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00020a200 items=0 ppid=3139 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:04.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346663383535633335333064643031363937303139373564393539 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.045000 audit: BPF prog-id=161 op=LOAD Feb 9 19:54:04.045000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00020a248 items=0 ppid=3139 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:04.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346663383535633335333064643031363937303139373564393539 Feb 9 19:54:04.066000 audit: BPF prog-id=161 op=UNLOAD Feb 9 19:54:04.066000 audit: BPF prog-id=160 op=UNLOAD Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { perfmon } for pid=3244 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit[3244]: AVC avc: denied { bpf } for pid=3244 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:04.066000 audit: BPF prog-id=162 op=LOAD Feb 9 19:54:04.066000 audit[3244]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00020a2d8 items=0 ppid=3139 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:04.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033346663383535633335333064643031363937303139373564393539 Feb 9 19:54:05.004324 kubelet[2111]: E0209 19:54:05.004274 2111 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:54:05.071432 env[1154]: time="2024-02-09T19:54:05.071338073Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:54:05.075491 systemd[1]: cri-containerd-034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51.scope: Deactivated successfully. Feb 9 19:54:05.079000 audit: BPF prog-id=162 op=UNLOAD Feb 9 19:54:05.106305 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51-rootfs.mount: Deactivated successfully. Feb 9 19:54:05.166449 kubelet[2111]: I0209 19:54:05.166412 2111 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:54:05.197196 kubelet[2111]: I0209 19:54:05.197149 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:54:05.205055 kubelet[2111]: I0209 19:54:05.205018 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:54:05.205569 kubelet[2111]: I0209 19:54:05.205541 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:54:05.212968 systemd[1]: Created slice kubepods-burstable-podb5dceea0_71b1_4028_9c85_42486fce2908.slice. Feb 9 19:54:05.239941 systemd[1]: Created slice kubepods-besteffort-pode040a7a1_2b7f_44e9_89af_86f4016d35cf.slice. Feb 9 19:54:05.241571 kubelet[2111]: I0209 19:54:05.241539 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9c55j\" (UniqueName: \"kubernetes.io/projected/b5dceea0-71b1-4028-9c85-42486fce2908-kube-api-access-9c55j\") pod \"coredns-787d4945fb-mql9n\" (UID: \"b5dceea0-71b1-4028-9c85-42486fce2908\") " pod="kube-system/coredns-787d4945fb-mql9n" Feb 9 19:54:05.241846 kubelet[2111]: I0209 19:54:05.241821 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c6qwb\" (UniqueName: \"kubernetes.io/projected/9b9a7006-b875-4858-8615-5296e26fc901-kube-api-access-c6qwb\") pod \"coredns-787d4945fb-sldhf\" (UID: \"9b9a7006-b875-4858-8615-5296e26fc901\") " pod="kube-system/coredns-787d4945fb-sldhf" Feb 9 19:54:05.242314 kubelet[2111]: I0209 19:54:05.242058 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9b9a7006-b875-4858-8615-5296e26fc901-config-volume\") pod \"coredns-787d4945fb-sldhf\" (UID: \"9b9a7006-b875-4858-8615-5296e26fc901\") " pod="kube-system/coredns-787d4945fb-sldhf" Feb 9 19:54:05.243441 kubelet[2111]: I0209 19:54:05.243405 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-spmx7\" (UniqueName: \"kubernetes.io/projected/e040a7a1-2b7f-44e9-89af-86f4016d35cf-kube-api-access-spmx7\") pod \"calico-kube-controllers-58df9d6994-lz7fq\" (UID: \"e040a7a1-2b7f-44e9-89af-86f4016d35cf\") " pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" Feb 9 19:54:05.243572 kubelet[2111]: I0209 19:54:05.243476 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b5dceea0-71b1-4028-9c85-42486fce2908-config-volume\") pod \"coredns-787d4945fb-mql9n\" (UID: \"b5dceea0-71b1-4028-9c85-42486fce2908\") " pod="kube-system/coredns-787d4945fb-mql9n" Feb 9 19:54:05.243572 kubelet[2111]: I0209 19:54:05.243560 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e040a7a1-2b7f-44e9-89af-86f4016d35cf-tigera-ca-bundle\") pod \"calico-kube-controllers-58df9d6994-lz7fq\" (UID: \"e040a7a1-2b7f-44e9-89af-86f4016d35cf\") " pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" Feb 9 19:54:05.259870 systemd[1]: Created slice kubepods-burstable-pod9b9a7006_b875_4858_8615_5296e26fc901.slice. Feb 9 19:54:05.554656 env[1154]: time="2024-02-09T19:54:05.554198869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58df9d6994-lz7fq,Uid:e040a7a1-2b7f-44e9-89af-86f4016d35cf,Namespace:calico-system,Attempt:0,}" Feb 9 19:54:05.568756 env[1154]: time="2024-02-09T19:54:05.568034799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sldhf,Uid:9b9a7006-b875-4858-8615-5296e26fc901,Namespace:kube-system,Attempt:0,}" Feb 9 19:54:05.828872 env[1154]: time="2024-02-09T19:54:05.828494092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mql9n,Uid:b5dceea0-71b1-4028-9c85-42486fce2908,Namespace:kube-system,Attempt:0,}" Feb 9 19:54:05.881101 env[1154]: time="2024-02-09T19:54:05.880988299Z" level=info msg="shim disconnected" id=034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51 Feb 9 19:54:05.881303 env[1154]: time="2024-02-09T19:54:05.881116532Z" level=warning msg="cleaning up after shim disconnected" id=034fc855c3530dd0169701975d959e621819f9efbe771057899800676aa9dd51 namespace=k8s.io Feb 9 19:54:05.881303 env[1154]: time="2024-02-09T19:54:05.881134348Z" level=info msg="cleaning up dead shim" Feb 9 19:54:05.900560 env[1154]: time="2024-02-09T19:54:05.900509313Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:54:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3295 runtime=io.containerd.runc.v2\n" Feb 9 19:54:06.035656 env[1154]: time="2024-02-09T19:54:06.035565953Z" level=error msg="Failed to destroy network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.036405 env[1154]: time="2024-02-09T19:54:06.036347036Z" level=error msg="encountered an error cleaning up failed sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.036655 env[1154]: time="2024-02-09T19:54:06.036610531Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58df9d6994-lz7fq,Uid:e040a7a1-2b7f-44e9-89af-86f4016d35cf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.038846 kubelet[2111]: E0209 19:54:06.037121 2111 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.038846 kubelet[2111]: E0209 19:54:06.037207 2111 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" Feb 9 19:54:06.038846 kubelet[2111]: E0209 19:54:06.037247 2111 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" Feb 9 19:54:06.040849 kubelet[2111]: E0209 19:54:06.040793 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-58df9d6994-lz7fq_calico-system(e040a7a1-2b7f-44e9-89af-86f4016d35cf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-58df9d6994-lz7fq_calico-system(e040a7a1-2b7f-44e9-89af-86f4016d35cf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" podUID=e040a7a1-2b7f-44e9-89af-86f4016d35cf Feb 9 19:54:06.074694 env[1154]: time="2024-02-09T19:54:06.074599137Z" level=error msg="Failed to destroy network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.075351 env[1154]: time="2024-02-09T19:54:06.075129173Z" level=error msg="encountered an error cleaning up failed sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.075351 env[1154]: time="2024-02-09T19:54:06.075212633Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mql9n,Uid:b5dceea0-71b1-4028-9c85-42486fce2908,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.078823 kubelet[2111]: E0209 19:54:06.075791 2111 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.078823 kubelet[2111]: E0209 19:54:06.075941 2111 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mql9n" Feb 9 19:54:06.078823 kubelet[2111]: E0209 19:54:06.075998 2111 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-mql9n" Feb 9 19:54:06.080689 kubelet[2111]: E0209 19:54:06.076134 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-mql9n_kube-system(b5dceea0-71b1-4028-9c85-42486fce2908)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-mql9n_kube-system(b5dceea0-71b1-4028-9c85-42486fce2908)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mql9n" podUID=b5dceea0-71b1-4028-9c85-42486fce2908 Feb 9 19:54:06.083213 env[1154]: time="2024-02-09T19:54:06.083151716Z" level=error msg="Failed to destroy network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.083786 env[1154]: time="2024-02-09T19:54:06.083736515Z" level=error msg="encountered an error cleaning up failed sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.083990 env[1154]: time="2024-02-09T19:54:06.083942866Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sldhf,Uid:9b9a7006-b875-4858-8615-5296e26fc901,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.084453 kubelet[2111]: E0209 19:54:06.084419 2111 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.084644 kubelet[2111]: E0209 19:54:06.084493 2111 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-sldhf" Feb 9 19:54:06.084644 kubelet[2111]: E0209 19:54:06.084528 2111 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-sldhf" Feb 9 19:54:06.086706 kubelet[2111]: E0209 19:54:06.084908 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-sldhf_kube-system(9b9a7006-b875-4858-8615-5296e26fc901)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-sldhf_kube-system(9b9a7006-b875-4858-8615-5296e26fc901)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-sldhf" podUID=9b9a7006-b875-4858-8615-5296e26fc901 Feb 9 19:54:06.107810 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac-shm.mount: Deactivated successfully. Feb 9 19:54:06.153184 kubelet[2111]: I0209 19:54:06.153135 2111 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:06.155026 env[1154]: time="2024-02-09T19:54:06.154959881Z" level=info msg="StopPodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\"" Feb 9 19:54:06.175294 env[1154]: time="2024-02-09T19:54:06.173700241Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:54:06.180278 kubelet[2111]: I0209 19:54:06.177494 2111 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:06.180626 env[1154]: time="2024-02-09T19:54:06.178495609Z" level=info msg="StopPodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\"" Feb 9 19:54:06.185263 kubelet[2111]: I0209 19:54:06.183342 2111 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:06.185706 env[1154]: time="2024-02-09T19:54:06.185661546Z" level=info msg="StopPodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\"" Feb 9 19:54:06.235400 env[1154]: time="2024-02-09T19:54:06.235322105Z" level=error msg="StopPodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" failed" error="failed to destroy network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.236314 kubelet[2111]: E0209 19:54:06.235940 2111 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:06.236314 kubelet[2111]: E0209 19:54:06.236031 2111 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac} Feb 9 19:54:06.236314 kubelet[2111]: E0209 19:54:06.236134 2111 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b5dceea0-71b1-4028-9c85-42486fce2908\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:54:06.236314 kubelet[2111]: E0209 19:54:06.236215 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b5dceea0-71b1-4028-9c85-42486fce2908\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-mql9n" podUID=b5dceea0-71b1-4028-9c85-42486fce2908 Feb 9 19:54:06.272341 env[1154]: time="2024-02-09T19:54:06.272254563Z" level=error msg="StopPodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" failed" error="failed to destroy network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.272595 kubelet[2111]: E0209 19:54:06.272563 2111 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:06.272717 kubelet[2111]: E0209 19:54:06.272616 2111 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8} Feb 9 19:54:06.272717 kubelet[2111]: E0209 19:54:06.272679 2111 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9b9a7006-b875-4858-8615-5296e26fc901\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:54:06.272908 kubelet[2111]: E0209 19:54:06.272728 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9b9a7006-b875-4858-8615-5296e26fc901\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-sldhf" podUID=9b9a7006-b875-4858-8615-5296e26fc901 Feb 9 19:54:06.279310 env[1154]: time="2024-02-09T19:54:06.279170537Z" level=error msg="StopPodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" failed" error="failed to destroy network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:06.279598 kubelet[2111]: E0209 19:54:06.279571 2111 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:06.279731 kubelet[2111]: E0209 19:54:06.279623 2111 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1} Feb 9 19:54:06.279731 kubelet[2111]: E0209 19:54:06.279675 2111 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e040a7a1-2b7f-44e9-89af-86f4016d35cf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:54:06.279731 kubelet[2111]: E0209 19:54:06.279725 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e040a7a1-2b7f-44e9-89af-86f4016d35cf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" podUID=e040a7a1-2b7f-44e9-89af-86f4016d35cf Feb 9 19:54:07.011286 systemd[1]: Created slice kubepods-besteffort-pod1ed01e30_f309_4f72_8cb5_b2fd43215dfd.slice. Feb 9 19:54:07.015769 env[1154]: time="2024-02-09T19:54:07.015710386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5k9nk,Uid:1ed01e30-f309-4f72-8cb5-b2fd43215dfd,Namespace:calico-system,Attempt:0,}" Feb 9 19:54:07.126847 env[1154]: time="2024-02-09T19:54:07.126762157Z" level=error msg="Failed to destroy network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:07.130559 env[1154]: time="2024-02-09T19:54:07.130486229Z" level=error msg="encountered an error cleaning up failed sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:07.130834 env[1154]: time="2024-02-09T19:54:07.130772526Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5k9nk,Uid:1ed01e30-f309-4f72-8cb5-b2fd43215dfd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:07.133414 kubelet[2111]: E0209 19:54:07.131248 2111 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:07.133414 kubelet[2111]: E0209 19:54:07.131335 2111 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:54:07.133414 kubelet[2111]: E0209 19:54:07.131375 2111 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5k9nk" Feb 9 19:54:07.133023 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f-shm.mount: Deactivated successfully. Feb 9 19:54:07.134264 kubelet[2111]: E0209 19:54:07.131449 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5k9nk_calico-system(1ed01e30-f309-4f72-8cb5-b2fd43215dfd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5k9nk_calico-system(1ed01e30-f309-4f72-8cb5-b2fd43215dfd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:54:07.187294 kubelet[2111]: I0209 19:54:07.187236 2111 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:07.188208 env[1154]: time="2024-02-09T19:54:07.188140876Z" level=info msg="StopPodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\"" Feb 9 19:54:07.221852 env[1154]: time="2024-02-09T19:54:07.221781715Z" level=error msg="StopPodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" failed" error="failed to destroy network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:54:07.222434 kubelet[2111]: E0209 19:54:07.222378 2111 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:07.222434 kubelet[2111]: E0209 19:54:07.222437 2111 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f} Feb 9 19:54:07.222656 kubelet[2111]: E0209 19:54:07.222492 2111 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:54:07.222656 kubelet[2111]: E0209 19:54:07.222548 2111 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1ed01e30-f309-4f72-8cb5-b2fd43215dfd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5k9nk" podUID=1ed01e30-f309-4f72-8cb5-b2fd43215dfd Feb 9 19:54:12.603970 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount704480888.mount: Deactivated successfully. Feb 9 19:54:12.669343 env[1154]: time="2024-02-09T19:54:12.669274419Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:12.673145 env[1154]: time="2024-02-09T19:54:12.673099482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:12.675445 env[1154]: time="2024-02-09T19:54:12.675402048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:12.678108 env[1154]: time="2024-02-09T19:54:12.678045751Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:12.678837 env[1154]: time="2024-02-09T19:54:12.678793558Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:54:12.694110 env[1154]: time="2024-02-09T19:54:12.692139060Z" level=info msg="CreateContainer within sandbox \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:54:12.718918 env[1154]: time="2024-02-09T19:54:12.717990889Z" level=info msg="CreateContainer within sandbox \"8d9d96750eaa4b905593e894bcc32f1ad738e34f32122b9140e28ccc9020141b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9\"" Feb 9 19:54:12.719911 env[1154]: time="2024-02-09T19:54:12.719863989Z" level=info msg="StartContainer for \"e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9\"" Feb 9 19:54:12.754810 systemd[1]: Started cri-containerd-e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9.scope. Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.810391 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:54:12.810619 kernel: audit: type=1400 audit(1707508452.782:1158): avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.842211 kernel: audit: type=1300 audit(1707508452.782:1158): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3139 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:12.782000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3139 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:12.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393338313862376362323538616431313766623162333439303432 Feb 9 19:54:12.872131 kernel: audit: type=1327 audit(1707508452.782:1158): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393338313862376362323538616431313766623162333439303432 Feb 9 19:54:12.872330 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.913406 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.934686 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.934872 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.999651 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.999827 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.999874 kernel: audit: type=1400 audit(1707508452.782:1159): avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.782000 audit: BPF prog-id=163 op=LOAD Feb 9 19:54:12.782000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003083c0 items=0 ppid=3139 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:12.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393338313862376362323538616431313766623162333439303432 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.809000 audit: BPF prog-id=164 op=LOAD Feb 9 19:54:12.809000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000308408 items=0 ppid=3139 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:12.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393338313862376362323538616431313766623162333439303432 Feb 9 19:54:12.841000 audit: BPF prog-id=164 op=UNLOAD Feb 9 19:54:12.841000 audit: BPF prog-id=163 op=UNLOAD Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:12.841000 audit: BPF prog-id=165 op=LOAD Feb 9 19:54:12.841000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000308498 items=0 ppid=3139 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:12.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393338313862376362323538616431313766623162333439303432 Feb 9 19:54:13.025218 env[1154]: time="2024-02-09T19:54:13.022800168Z" level=info msg="StartContainer for \"e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9\" returns successfully" Feb 9 19:54:13.094109 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:54:13.094297 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:54:14.222598 kubelet[2111]: I0209 19:54:14.222548 2111 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:54:14.589000 audit[3643]: AVC avc: denied { write } for pid=3643 comm="tee" name="fd" dev="proc" ino=26082 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.590000 audit[3637]: AVC avc: denied { write } for pid=3637 comm="tee" name="fd" dev="proc" ino=26085 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.590000 audit[3637]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4ee9692d a2=241 a3=1b6 items=1 ppid=3608 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.590000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:54:14.590000 audit: PATH item=0 name="/dev/fd/63" inode=26068 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.590000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:14.594000 audit[3655]: AVC avc: denied { write } for pid=3655 comm="tee" name="fd" dev="proc" ino=25293 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.589000 audit[3643]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff44de292f a2=241 a3=1b6 items=1 ppid=3603 pid=3643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.589000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:54:14.589000 audit: PATH item=0 name="/dev/fd/63" inode=26072 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.589000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:14.597000 audit[3648]: AVC avc: denied { write } for pid=3648 comm="tee" name="fd" dev="proc" ino=25296 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.597000 audit[3648]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5b69592e a2=241 a3=1b6 items=1 ppid=3605 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.597000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:54:14.597000 audit: PATH item=0 name="/dev/fd/63" inode=26076 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.597000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:14.601000 audit[3653]: AVC avc: denied { write } for pid=3653 comm="tee" name="fd" dev="proc" ino=25300 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.601000 audit[3653]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6b26192d a2=241 a3=1b6 items=1 ppid=3610 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.601000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:54:14.601000 audit: PATH item=0 name="/dev/fd/63" inode=25287 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.601000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:14.612000 audit[3651]: AVC avc: denied { write } for pid=3651 comm="tee" name="fd" dev="proc" ino=25304 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.612000 audit[3651]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9545291d a2=241 a3=1b6 items=1 ppid=3599 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.612000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:54:14.612000 audit: PATH item=0 name="/dev/fd/63" inode=25284 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.612000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:14.594000 audit[3655]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9c62691e a2=241 a3=1b6 items=1 ppid=3594 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.594000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:54:14.594000 audit: PATH item=0 name="/dev/fd/63" inode=25288 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.594000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:14.619000 audit[3657]: AVC avc: denied { write } for pid=3657 comm="tee" name="fd" dev="proc" ino=25312 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:54:14.619000 audit[3657]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9487792d a2=241 a3=1b6 items=1 ppid=3595 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:14.619000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:54:14.619000 audit: PATH item=0 name="/dev/fd/63" inode=25290 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:14.619000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:54:15.161548 systemd[1]: run-containerd-runc-k8s.io-e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9-runc.6Eplo3.mount: Deactivated successfully. Feb 9 19:54:15.223965 kubelet[2111]: I0209 19:54:15.223921 2111 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:54:15.259175 systemd[1]: run-containerd-runc-k8s.io-e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9-runc.jT7ljh.mount: Deactivated successfully. Feb 9 19:54:19.005099 env[1154]: time="2024-02-09T19:54:19.005024889Z" level=info msg="StopPodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\"" Feb 9 19:54:19.008110 env[1154]: time="2024-02-09T19:54:19.007330543Z" level=info msg="StopPodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\"" Feb 9 19:54:19.012452 env[1154]: time="2024-02-09T19:54:19.012402132Z" level=info msg="StopPodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\"" Feb 9 19:54:19.058377 kubelet[2111]: I0209 19:54:19.058317 2111 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 19:54:19.103198 kubelet[2111]: I0209 19:54:19.102387 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lmwb9" podStartSLOduration=-9.223372015752464e+09 pod.CreationTimestamp="2024-02-09 19:53:58 +0000 UTC" firstStartedPulling="2024-02-09 19:53:59.119497015 +0000 UTC m=+30.619433239" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:54:13.247984409 +0000 UTC m=+44.747920641" watchObservedRunningTime="2024-02-09 19:54:19.102311442 +0000 UTC m=+50.602247676" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.239 [INFO][3835] k8s.go 578: Cleaning up netns ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.239 [INFO][3835] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" iface="eth0" netns="/var/run/netns/cni-7e049fe8-658f-9f56-d871-28c141de0123" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.240 [INFO][3835] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" iface="eth0" netns="/var/run/netns/cni-7e049fe8-658f-9f56-d871-28c141de0123" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.240 [INFO][3835] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" iface="eth0" netns="/var/run/netns/cni-7e049fe8-658f-9f56-d871-28c141de0123" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.240 [INFO][3835] k8s.go 585: Releasing IP address(es) ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.240 [INFO][3835] utils.go 188: Calico CNI releasing IP address ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.302 [INFO][3880] ipam_plugin.go 415: Releasing address using handleID ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.302 [INFO][3880] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.302 [INFO][3880] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.318 [WARNING][3880] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.318 [INFO][3880] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.332 [INFO][3880] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:19.339866 env[1154]: 2024-02-09 19:54:19.333 [INFO][3835] k8s.go 591: Teardown processing complete. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:19.344620 systemd[1]: run-netns-cni\x2d7e049fe8\x2d658f\x2d9f56\x2dd871\x2d28c141de0123.mount: Deactivated successfully. Feb 9 19:54:19.348465 env[1154]: time="2024-02-09T19:54:19.348411442Z" level=info msg="TearDown network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" successfully" Feb 9 19:54:19.348645 env[1154]: time="2024-02-09T19:54:19.348614508Z" level=info msg="StopPodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" returns successfully" Feb 9 19:54:19.349687 env[1154]: time="2024-02-09T19:54:19.349651551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5k9nk,Uid:1ed01e30-f309-4f72-8cb5-b2fd43215dfd,Namespace:calico-system,Attempt:1,}" Feb 9 19:54:19.393000 audit[3909]: NETFILTER_CFG table=filter:115 family=2 entries=13 op=nft_register_rule pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:19.400059 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:54:19.400218 kernel: audit: type=1325 audit(1707508459.393:1171): table=filter:115 family=2 entries=13 op=nft_register_rule pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:19.393000 audit[3909]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd3b1b8230 a2=0 a3=7ffd3b1b821c items=0 ppid=2323 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.225 [INFO][3839] k8s.go 578: Cleaning up netns ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.225 [INFO][3839] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" iface="eth0" netns="/var/run/netns/cni-b533a6d5-b157-64d4-4c7d-a3fc8fc28030" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.225 [INFO][3839] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" iface="eth0" netns="/var/run/netns/cni-b533a6d5-b157-64d4-4c7d-a3fc8fc28030" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.226 [INFO][3839] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" iface="eth0" netns="/var/run/netns/cni-b533a6d5-b157-64d4-4c7d-a3fc8fc28030" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.226 [INFO][3839] k8s.go 585: Releasing IP address(es) ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.226 [INFO][3839] utils.go 188: Calico CNI releasing IP address ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.326 [INFO][3875] ipam_plugin.go 415: Releasing address using handleID ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.327 [INFO][3875] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.357 [INFO][3875] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.408 [WARNING][3875] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.409 [INFO][3875] ipam_plugin.go 443: Releasing address using workloadID ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.411 [INFO][3875] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:19.429940 env[1154]: 2024-02-09 19:54:19.427 [INFO][3839] k8s.go 591: Teardown processing complete. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:19.461411 env[1154]: time="2024-02-09T19:54:19.461353168Z" level=info msg="TearDown network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" successfully" Feb 9 19:54:19.461622 env[1154]: time="2024-02-09T19:54:19.461590756Z" level=info msg="StopPodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" returns successfully" Feb 9 19:54:19.462448 kernel: audit: type=1300 audit(1707508459.393:1171): arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffd3b1b8230 a2=0 a3=7ffd3b1b821c items=0 ppid=2323 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:19.462910 env[1154]: time="2024-02-09T19:54:19.462858267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sldhf,Uid:9b9a7006-b875-4858-8615-5296e26fc901,Namespace:kube-system,Attempt:1,}" Feb 9 19:54:19.464929 systemd[1]: run-netns-cni\x2db533a6d5\x2db157\x2d64d4\x2d4c7d\x2da3fc8fc28030.mount: Deactivated successfully. Feb 9 19:54:19.393000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:19.487120 kernel: audit: type=1327 audit(1707508459.393:1171): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:19.416000 audit[3909]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:19.514259 kernel: audit: type=1325 audit(1707508459.416:1172): table=nat:116 family=2 entries=27 op=nft_register_chain pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:19.514401 kernel: audit: type=1300 audit(1707508459.416:1172): arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd3b1b8230 a2=0 a3=7ffd3b1b821c items=0 ppid=2323 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:19.416000 audit[3909]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffd3b1b8230 a2=0 a3=7ffd3b1b821c items=0 ppid=2323 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.250 [INFO][3846] k8s.go 578: Cleaning up netns ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.250 [INFO][3846] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" iface="eth0" netns="/var/run/netns/cni-c1df9392-2c87-0f14-9f4e-a4a4bc7d9022" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.250 [INFO][3846] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" iface="eth0" netns="/var/run/netns/cni-c1df9392-2c87-0f14-9f4e-a4a4bc7d9022" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.251 [INFO][3846] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" iface="eth0" netns="/var/run/netns/cni-c1df9392-2c87-0f14-9f4e-a4a4bc7d9022" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.251 [INFO][3846] k8s.go 585: Releasing IP address(es) ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.251 [INFO][3846] utils.go 188: Calico CNI releasing IP address ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.389 [INFO][3885] ipam_plugin.go 415: Releasing address using handleID ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.389 [INFO][3885] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.412 [INFO][3885] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.495 [WARNING][3885] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.495 [INFO][3885] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.558 [INFO][3885] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:19.564338 env[1154]: 2024-02-09 19:54:19.561 [INFO][3846] k8s.go 591: Teardown processing complete. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:19.568643 env[1154]: time="2024-02-09T19:54:19.568459063Z" level=info msg="TearDown network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" successfully" Feb 9 19:54:19.568643 env[1154]: time="2024-02-09T19:54:19.568534774Z" level=info msg="StopPodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" returns successfully" Feb 9 19:54:19.570515 env[1154]: time="2024-02-09T19:54:19.569609519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mql9n,Uid:b5dceea0-71b1-4028-9c85-42486fce2908,Namespace:kube-system,Attempt:1,}" Feb 9 19:54:19.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:19.589699 kernel: audit: type=1327 audit(1707508459.416:1172): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:19.843305 systemd-networkd[1034]: cali44cd77cff98: Link UP Feb 9 19:54:19.857180 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:54:19.857330 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali44cd77cff98: link becomes ready Feb 9 19:54:19.860541 systemd-networkd[1034]: cali44cd77cff98: Gained carrier Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.443 [INFO][3904] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.571 [INFO][3904] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0 csi-node-driver- calico-system 1ed01e30-f309-4f72-8cb5-b2fd43215dfd 788 0 2024-02-09 19:53:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal csi-node-driver-5k9nk eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali44cd77cff98 [] []}} ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.571 [INFO][3904] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.727 [INFO][3946] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" HandleID="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.757 [INFO][3946] ipam_plugin.go 268: Auto assigning IP ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" HandleID="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000205730), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", "pod":"csi-node-driver-5k9nk", "timestamp":"2024-02-09 19:54:19.7273753 +0000 UTC"}, Hostname:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.757 [INFO][3946] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.757 [INFO][3946] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.757 [INFO][3946] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.760 [INFO][3946] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.768 [INFO][3946] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.776 [INFO][3946] ipam.go 489: Trying affinity for 192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.780 [INFO][3946] ipam.go 155: Attempting to load block cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.788 [INFO][3946] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.788 [INFO][3946] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.0/26 handle="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.796 [INFO][3946] ipam.go 1682: Creating new handle: k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3 Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.801 [INFO][3946] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.0/26 handle="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.820 [INFO][3946] ipam.go 1216: Successfully claimed IPs: [192.168.61.1/26] block=192.168.61.0/26 handle="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.820 [INFO][3946] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.1/26] handle="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.821 [INFO][3946] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:19.891828 env[1154]: 2024-02-09 19:54:19.821 [INFO][3946] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.1/26] IPv6=[] ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" HandleID="k8s-pod-network.d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.894154 env[1154]: 2024-02-09 19:54:19.822 [INFO][3904] k8s.go 385: Populated endpoint ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ed01e30-f309-4f72-8cb5-b2fd43215dfd", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-5k9nk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali44cd77cff98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:19.894154 env[1154]: 2024-02-09 19:54:19.823 [INFO][3904] k8s.go 386: Calico CNI using IPs: [192.168.61.1/32] ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.894154 env[1154]: 2024-02-09 19:54:19.823 [INFO][3904] dataplane_linux.go 68: Setting the host side veth name to cali44cd77cff98 ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.894154 env[1154]: 2024-02-09 19:54:19.861 [INFO][3904] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.894154 env[1154]: 2024-02-09 19:54:19.862 [INFO][3904] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ed01e30-f309-4f72-8cb5-b2fd43215dfd", ResourceVersion:"788", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3", Pod:"csi-node-driver-5k9nk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali44cd77cff98", MAC:"36:0c:08:03:91:d1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:19.894154 env[1154]: 2024-02-09 19:54:19.888 [INFO][3904] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3" Namespace="calico-system" Pod="csi-node-driver-5k9nk" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:19.930887 systemd-networkd[1034]: cali50c0d546fe7: Link UP Feb 9 19:54:19.941217 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali50c0d546fe7: link becomes ready Feb 9 19:54:19.940221 systemd-networkd[1034]: cali50c0d546fe7: Gained carrier Feb 9 19:54:19.960481 env[1154]: time="2024-02-09T19:54:19.960204657Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:54:19.960481 env[1154]: time="2024-02-09T19:54:19.960270083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:54:19.960481 env[1154]: time="2024-02-09T19:54:19.960290571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:54:19.961054 env[1154]: time="2024-02-09T19:54:19.960947152Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3 pid=3997 runtime=io.containerd.runc.v2 Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.552 [INFO][3921] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.617 [INFO][3921] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0 coredns-787d4945fb- kube-system 9b9a7006-b875-4858-8615-5296e26fc901 787 0 2024-02-09 19:53:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal coredns-787d4945fb-sldhf eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali50c0d546fe7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.617 [INFO][3921] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.753 [INFO][3950] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" HandleID="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.789 [INFO][3950] ipam_plugin.go 268: Auto assigning IP ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" HandleID="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d710), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", "pod":"coredns-787d4945fb-sldhf", "timestamp":"2024-02-09 19:54:19.745813021 +0000 UTC"}, Hostname:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.789 [INFO][3950] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.820 [INFO][3950] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.820 [INFO][3950] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.828 [INFO][3950] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.851 [INFO][3950] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.859 [INFO][3950] ipam.go 489: Trying affinity for 192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.879 [INFO][3950] ipam.go 155: Attempting to load block cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.892 [INFO][3950] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.892 [INFO][3950] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.0/26 handle="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.895 [INFO][3950] ipam.go 1682: Creating new handle: k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93 Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.901 [INFO][3950] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.0/26 handle="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.915 [INFO][3950] ipam.go 1216: Successfully claimed IPs: [192.168.61.2/26] block=192.168.61.0/26 handle="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.915 [INFO][3950] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.2/26] handle="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.915 [INFO][3950] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:19.975560 env[1154]: 2024-02-09 19:54:19.915 [INFO][3950] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.2/26] IPv6=[] ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" HandleID="k8s-pod-network.cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.976846 env[1154]: 2024-02-09 19:54:19.919 [INFO][3921] k8s.go 385: Populated endpoint ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9b9a7006-b875-4858-8615-5296e26fc901", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-787d4945fb-sldhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50c0d546fe7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:19.976846 env[1154]: 2024-02-09 19:54:19.919 [INFO][3921] k8s.go 386: Calico CNI using IPs: [192.168.61.2/32] ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.976846 env[1154]: 2024-02-09 19:54:19.919 [INFO][3921] dataplane_linux.go 68: Setting the host side veth name to cali50c0d546fe7 ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.976846 env[1154]: 2024-02-09 19:54:19.941 [INFO][3921] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:19.976846 env[1154]: 2024-02-09 19:54:19.952 [INFO][3921] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9b9a7006-b875-4858-8615-5296e26fc901", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93", Pod:"coredns-787d4945fb-sldhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50c0d546fe7", MAC:"02:30:61:8a:58:8e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:19.976846 env[1154]: 2024-02-09 19:54:19.972 [INFO][3921] k8s.go 491: Wrote updated endpoint to datastore ContainerID="cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93" Namespace="kube-system" Pod="coredns-787d4945fb-sldhf" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:20.004857 env[1154]: time="2024-02-09T19:54:20.004806977Z" level=info msg="StopPodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\"" Feb 9 19:54:20.025708 systemd[1]: Started cri-containerd-d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3.scope. Feb 9 19:54:20.080406 systemd-networkd[1034]: calie2537541226: Link UP Feb 9 19:54:20.094253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie2537541226: link becomes ready Feb 9 19:54:20.097378 systemd-networkd[1034]: calie2537541226: Gained carrier Feb 9 19:54:20.106539 env[1154]: time="2024-02-09T19:54:20.106363370Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:54:20.107158 env[1154]: time="2024-02-09T19:54:20.107100535Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:54:20.107407 env[1154]: time="2024-02-09T19:54:20.107368965Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:54:20.107878 env[1154]: time="2024-02-09T19:54:20.107821988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93 pid=4062 runtime=io.containerd.runc.v2 Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.700 [INFO][3935] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.738 [INFO][3935] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0 coredns-787d4945fb- kube-system b5dceea0-71b1-4028-9c85-42486fce2908 789 0 2024-02-09 19:53:43 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal coredns-787d4945fb-mql9n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie2537541226 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.738 [INFO][3935] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.822 [INFO][3964] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" HandleID="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.851 [INFO][3964] ipam_plugin.go 268: Auto assigning IP ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" HandleID="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cac0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", "pod":"coredns-787d4945fb-mql9n", "timestamp":"2024-02-09 19:54:19.822134581 +0000 UTC"}, Hostname:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.851 [INFO][3964] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.916 [INFO][3964] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.916 [INFO][3964] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.921 [INFO][3964] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.939 [INFO][3964] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.970 [INFO][3964] ipam.go 489: Trying affinity for 192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.974 [INFO][3964] ipam.go 155: Attempting to load block cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.982 [INFO][3964] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:19.982 [INFO][3964] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.0/26 handle="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:20.001 [INFO][3964] ipam.go 1682: Creating new handle: k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:20.017 [INFO][3964] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.0/26 handle="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:20.035 [INFO][3964] ipam.go 1216: Successfully claimed IPs: [192.168.61.3/26] block=192.168.61.0/26 handle="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:20.035 [INFO][3964] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.3/26] handle="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:20.035 [INFO][3964] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:20.125231 env[1154]: 2024-02-09 19:54:20.036 [INFO][3964] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.3/26] IPv6=[] ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" HandleID="k8s-pod-network.1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.126581 env[1154]: 2024-02-09 19:54:20.060 [INFO][3935] k8s.go 385: Populated endpoint ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b5dceea0-71b1-4028-9c85-42486fce2908", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-787d4945fb-mql9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie2537541226", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:20.126581 env[1154]: 2024-02-09 19:54:20.060 [INFO][3935] k8s.go 386: Calico CNI using IPs: [192.168.61.3/32] ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.126581 env[1154]: 2024-02-09 19:54:20.061 [INFO][3935] dataplane_linux.go 68: Setting the host side veth name to calie2537541226 ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.126581 env[1154]: 2024-02-09 19:54:20.098 [INFO][3935] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.126581 env[1154]: 2024-02-09 19:54:20.099 [INFO][3935] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b5dceea0-71b1-4028-9c85-42486fce2908", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c", Pod:"coredns-787d4945fb-mql9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie2537541226", MAC:"9e:dd:b8:cc:7a:22", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:20.126581 env[1154]: 2024-02-09 19:54:20.123 [INFO][3935] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c" Namespace="kube-system" Pod="coredns-787d4945fb-mql9n" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154215 kernel: audit: type=1400 audit(1707508460.130:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.173255 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:54:20.173418 kernel: audit: audit_lost=106 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:54:20.173467 kernel: audit: backlog limit exceeded Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.130000 audit: BPF prog-id=166 op=LOAD Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3997 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643561643233633261316265383930356432666132656466343830 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3997 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643561643233633261316265383930356432666132656466343830 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.153000 audit: BPF prog-id=167 op=LOAD Feb 9 19:54:20.153000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000332570 items=0 ppid=3997 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643561643233633261316265383930356432666132656466343830 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c000117770 a2=78 a3=c0003325b8 items=0 ppid=3997 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643561643233633261316265383930356432666132656466343830 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit: BPF prog-id=168 op=LOAD Feb 9 19:54:20.154000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=1 items=0 ppid=3997 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643561643233633261316265383930356432666132656466343830 Feb 9 19:54:20.154000 audit: BPF prog-id=168 op=UNLOAD Feb 9 19:54:20.154000 audit: BPF prog-id=167 op=UNLOAD Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.154000 audit: BPF prog-id=169 op=LOAD Feb 9 19:54:20.154000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003329c8 items=0 ppid=3997 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431643561643233633261316265383930356432666132656466343830 Feb 9 19:54:20.216883 env[1154]: time="2024-02-09T19:54:20.216821041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5k9nk,Uid:1ed01e30-f309-4f72-8cb5-b2fd43215dfd,Namespace:calico-system,Attempt:1,} returns sandbox id \"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3\"" Feb 9 19:54:20.222026 env[1154]: time="2024-02-09T19:54:20.221956217Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:54:20.276742 systemd[1]: Started cri-containerd-cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93.scope. Feb 9 19:54:20.299322 env[1154]: time="2024-02-09T19:54:20.299231344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:54:20.299601 env[1154]: time="2024-02-09T19:54:20.299560661Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:54:20.299774 env[1154]: time="2024-02-09T19:54:20.299729876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:54:20.300131 env[1154]: time="2024-02-09T19:54:20.300062489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c pid=4122 runtime=io.containerd.runc.v2 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.336000 audit: BPF prog-id=170 op=LOAD Feb 9 19:54:20.338000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.338000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4062 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303937396332666664666230653435396165326162643638623632 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4062 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303937396332666664666230653435396165326162643638623632 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.339000 audit: BPF prog-id=171 op=LOAD Feb 9 19:54:20.339000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003087d0 items=0 ppid=4062 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303937396332666664666230653435396165326162643638623632 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.357000 audit: BPF prog-id=172 op=LOAD Feb 9 19:54:20.357000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000308818 items=0 ppid=4062 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303937396332666664666230653435396165326162643638623632 Feb 9 19:54:20.365000 audit: BPF prog-id=172 op=UNLOAD Feb 9 19:54:20.365000 audit: BPF prog-id=171 op=UNLOAD Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { perfmon } for pid=4079 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit[4079]: AVC avc: denied { bpf } for pid=4079 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.365000 audit: BPF prog-id=173 op=LOAD Feb 9 19:54:20.368796 systemd[1]: run-netns-cni\x2dc1df9392\x2d2c87\x2d0f14\x2d9f4e\x2da4a4bc7d9022.mount: Deactivated successfully. Feb 9 19:54:20.365000 audit[4079]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000308c28 items=0 ppid=4062 pid=4079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366303937396332666664666230653435396165326162643638623632 Feb 9 19:54:20.383679 systemd[1]: Started cri-containerd-1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c.scope. Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.296 [INFO][4063] k8s.go 578: Cleaning up netns ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.297 [INFO][4063] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" iface="eth0" netns="/var/run/netns/cni-e2d0a236-1d1d-f93f-b4ea-5afdab759e98" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.297 [INFO][4063] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" iface="eth0" netns="/var/run/netns/cni-e2d0a236-1d1d-f93f-b4ea-5afdab759e98" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.297 [INFO][4063] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" iface="eth0" netns="/var/run/netns/cni-e2d0a236-1d1d-f93f-b4ea-5afdab759e98" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.297 [INFO][4063] k8s.go 585: Releasing IP address(es) ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.297 [INFO][4063] utils.go 188: Calico CNI releasing IP address ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.406 [INFO][4126] ipam_plugin.go 415: Releasing address using handleID ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.407 [INFO][4126] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.407 [INFO][4126] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.417 [WARNING][4126] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.418 [INFO][4126] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.422 [INFO][4126] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:20.425552 env[1154]: 2024-02-09 19:54:20.423 [INFO][4063] k8s.go 591: Teardown processing complete. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:20.430357 env[1154]: time="2024-02-09T19:54:20.430298821Z" level=info msg="TearDown network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" successfully" Feb 9 19:54:20.430370 systemd[1]: run-netns-cni\x2de2d0a236\x2d1d1d\x2df93f\x2db4ea\x2d5afdab759e98.mount: Deactivated successfully. Feb 9 19:54:20.430688 env[1154]: time="2024-02-09T19:54:20.430653537Z" level=info msg="StopPodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" returns successfully" Feb 9 19:54:20.434420 env[1154]: time="2024-02-09T19:54:20.434372520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58df9d6994-lz7fq,Uid:e040a7a1-2b7f-44e9-89af-86f4016d35cf,Namespace:calico-system,Attempt:1,}" Feb 9 19:54:20.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.434000 audit: BPF prog-id=174 op=LOAD Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4122 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303265313566643032623061623932333263666136653532303930 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4122 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303265313566643032623061623932333263666136653532303930 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit: BPF prog-id=175 op=LOAD Feb 9 19:54:20.435000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aa720 items=0 ppid=4122 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303265313566643032623061623932333263666136653532303930 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit: BPF prog-id=176 op=LOAD Feb 9 19:54:20.435000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aa768 items=0 ppid=4122 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303265313566643032623061623932333263666136653532303930 Feb 9 19:54:20.435000 audit: BPF prog-id=176 op=UNLOAD Feb 9 19:54:20.435000 audit: BPF prog-id=175 op=UNLOAD Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { perfmon } for pid=4135 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit[4135]: AVC avc: denied { bpf } for pid=4135 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.435000 audit: BPF prog-id=177 op=LOAD Feb 9 19:54:20.435000 audit[4135]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aab78 items=0 ppid=4122 pid=4135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166303265313566643032623061623932333263666136653532303930 Feb 9 19:54:20.528563 env[1154]: time="2024-02-09T19:54:20.528503915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-sldhf,Uid:9b9a7006-b875-4858-8615-5296e26fc901,Namespace:kube-system,Attempt:1,} returns sandbox id \"cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93\"" Feb 9 19:54:20.536789 env[1154]: time="2024-02-09T19:54:20.536683657Z" level=info msg="CreateContainer within sandbox \"cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:54:20.573796 env[1154]: time="2024-02-09T19:54:20.573735519Z" level=info msg="CreateContainer within sandbox \"cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"1c6ab5b191c036c38b9c2e37484d971881eb61c8b2912a29e5db3858c88e6fa2\"" Feb 9 19:54:20.576646 env[1154]: time="2024-02-09T19:54:20.576570569Z" level=info msg="StartContainer for \"1c6ab5b191c036c38b9c2e37484d971881eb61c8b2912a29e5db3858c88e6fa2\"" Feb 9 19:54:20.613620 env[1154]: time="2024-02-09T19:54:20.613489424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-mql9n,Uid:b5dceea0-71b1-4028-9c85-42486fce2908,Namespace:kube-system,Attempt:1,} returns sandbox id \"1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c\"" Feb 9 19:54:20.621627 env[1154]: time="2024-02-09T19:54:20.621560442Z" level=info msg="CreateContainer within sandbox \"1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 19:54:20.642786 env[1154]: time="2024-02-09T19:54:20.642734110Z" level=info msg="CreateContainer within sandbox \"1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c5ac97e53084623c91213e808e2757447beafd3d4bc4390234e65ee13b01d5a8\"" Feb 9 19:54:20.645508 env[1154]: time="2024-02-09T19:54:20.645464219Z" level=info msg="StartContainer for \"c5ac97e53084623c91213e808e2757447beafd3d4bc4390234e65ee13b01d5a8\"" Feb 9 19:54:20.671781 systemd[1]: Started cri-containerd-1c6ab5b191c036c38b9c2e37484d971881eb61c8b2912a29e5db3858c88e6fa2.scope. Feb 9 19:54:20.707503 systemd[1]: Started cri-containerd-c5ac97e53084623c91213e808e2757447beafd3d4bc4390234e65ee13b01d5a8.scope. Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.722000 audit: BPF prog-id=178 op=LOAD Feb 9 19:54:20.722000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.722000 audit[4206]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4062 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163366162356231393163303336633338623963326533373438346439 Feb 9 19:54:20.722000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.722000 audit[4206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4062 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163366162356231393163303336633338623963326533373438346439 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit: BPF prog-id=179 op=LOAD Feb 9 19:54:20.723000 audit[4206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030fce0 items=0 ppid=4062 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163366162356231393163303336633338623963326533373438346439 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit: BPF prog-id=180 op=LOAD Feb 9 19:54:20.723000 audit[4206]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030fd28 items=0 ppid=4062 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163366162356231393163303336633338623963326533373438346439 Feb 9 19:54:20.723000 audit: BPF prog-id=180 op=UNLOAD Feb 9 19:54:20.723000 audit: BPF prog-id=179 op=UNLOAD Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { perfmon } for pid=4206 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit[4206]: AVC avc: denied { bpf } for pid=4206 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.723000 audit: BPF prog-id=181 op=LOAD Feb 9 19:54:20.723000 audit[4206]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038c138 items=0 ppid=4062 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163366162356231393163303336633338623963326533373438346439 Feb 9 19:54:20.787139 env[1154]: time="2024-02-09T19:54:20.787039365Z" level=info msg="StartContainer for \"1c6ab5b191c036c38b9c2e37484d971881eb61c8b2912a29e5db3858c88e6fa2\" returns successfully" Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.813000 audit: BPF prog-id=182 op=LOAD Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4122 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616339376535333038343632336339313231336538303865323735 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4122 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616339376535333038343632336339313231336538303865323735 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit: BPF prog-id=183 op=LOAD Feb 9 19:54:20.814000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000284a10 items=0 ppid=4122 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616339376535333038343632336339313231336538303865323735 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit: BPF prog-id=184 op=LOAD Feb 9 19:54:20.814000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000284a58 items=0 ppid=4122 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616339376535333038343632336339313231336538303865323735 Feb 9 19:54:20.814000 audit: BPF prog-id=184 op=UNLOAD Feb 9 19:54:20.814000 audit: BPF prog-id=183 op=UNLOAD Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { perfmon } for pid=4224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit[4224]: AVC avc: denied { bpf } for pid=4224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:20.814000 audit: BPF prog-id=185 op=LOAD Feb 9 19:54:20.814000 audit[4224]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000284e68 items=0 ppid=4122 pid=4224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:20.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335616339376535333038343632336339313231336538303865323735 Feb 9 19:54:20.849872 env[1154]: time="2024-02-09T19:54:20.849809733Z" level=info msg="StartContainer for \"c5ac97e53084623c91213e808e2757447beafd3d4bc4390234e65ee13b01d5a8\" returns successfully" Feb 9 19:54:20.900837 systemd-networkd[1034]: cali554e4b4d0fd: Link UP Feb 9 19:54:20.920357 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:54:20.920489 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali554e4b4d0fd: link becomes ready Feb 9 19:54:20.924397 systemd-networkd[1034]: cali554e4b4d0fd: Gained carrier Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.631 [INFO][4164] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.684 [INFO][4164] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0 calico-kube-controllers-58df9d6994- calico-system e040a7a1-2b7f-44e9-89af-86f4016d35cf 804 0 2024-02-09 19:53:50 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:58df9d6994 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal calico-kube-controllers-58df9d6994-lz7fq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali554e4b4d0fd [] []}} ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.684 [INFO][4164] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.778 [INFO][4241] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" HandleID="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.808 [INFO][4241] ipam_plugin.go 268: Auto assigning IP ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" HandleID="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bea20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", "pod":"calico-kube-controllers-58df9d6994-lz7fq", "timestamp":"2024-02-09 19:54:20.778687551 +0000 UTC"}, Hostname:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.808 [INFO][4241] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.808 [INFO][4241] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.808 [INFO][4241] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.819 [INFO][4241] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.826 [INFO][4241] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.842 [INFO][4241] ipam.go 489: Trying affinity for 192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.846 [INFO][4241] ipam.go 155: Attempting to load block cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.857 [INFO][4241] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.857 [INFO][4241] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.0/26 handle="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.861 [INFO][4241] ipam.go 1682: Creating new handle: k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8 Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.868 [INFO][4241] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.0/26 handle="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.880 [INFO][4241] ipam.go 1216: Successfully claimed IPs: [192.168.61.4/26] block=192.168.61.0/26 handle="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.880 [INFO][4241] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.4/26] handle="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.880 [INFO][4241] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:20.940933 env[1154]: 2024-02-09 19:54:20.880 [INFO][4241] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.4/26] IPv6=[] ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" HandleID="k8s-pod-network.3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.942298 env[1154]: 2024-02-09 19:54:20.882 [INFO][4164] k8s.go 385: Populated endpoint ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0", GenerateName:"calico-kube-controllers-58df9d6994-", Namespace:"calico-system", SelfLink:"", UID:"e040a7a1-2b7f-44e9-89af-86f4016d35cf", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58df9d6994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-58df9d6994-lz7fq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali554e4b4d0fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:20.942298 env[1154]: 2024-02-09 19:54:20.882 [INFO][4164] k8s.go 386: Calico CNI using IPs: [192.168.61.4/32] ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.942298 env[1154]: 2024-02-09 19:54:20.882 [INFO][4164] dataplane_linux.go 68: Setting the host side veth name to cali554e4b4d0fd ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.942298 env[1154]: 2024-02-09 19:54:20.922 [INFO][4164] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.942298 env[1154]: 2024-02-09 19:54:20.923 [INFO][4164] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0", GenerateName:"calico-kube-controllers-58df9d6994-", Namespace:"calico-system", SelfLink:"", UID:"e040a7a1-2b7f-44e9-89af-86f4016d35cf", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58df9d6994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8", Pod:"calico-kube-controllers-58df9d6994-lz7fq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali554e4b4d0fd", MAC:"0e:1c:40:75:ce:d2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:20.942298 env[1154]: 2024-02-09 19:54:20.938 [INFO][4164] k8s.go 491: Wrote updated endpoint to datastore ContainerID="3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8" Namespace="calico-system" Pod="calico-kube-controllers-58df9d6994-lz7fq" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:20.972848 env[1154]: time="2024-02-09T19:54:20.972730978Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:54:20.972848 env[1154]: time="2024-02-09T19:54:20.972791839Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:54:20.973175 env[1154]: time="2024-02-09T19:54:20.972810259Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:54:20.973445 env[1154]: time="2024-02-09T19:54:20.973401109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8 pid=4297 runtime=io.containerd.runc.v2 Feb 9 19:54:21.002567 systemd[1]: Started cri-containerd-3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8.scope. Feb 9 19:54:21.014495 systemd-networkd[1034]: cali44cd77cff98: Gained IPv6LL Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.075000 audit: BPF prog-id=186 op=LOAD Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663437393465346238316137376431356336313638366361616531 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663437393465346238316137376431356336313638366361616531 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit: BPF prog-id=187 op=LOAD Feb 9 19:54:21.076000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098360 items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663437393465346238316137376431356336313638366361616531 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit: BPF prog-id=188 op=LOAD Feb 9 19:54:21.076000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000983a8 items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663437393465346238316137376431356336313638366361616531 Feb 9 19:54:21.076000 audit: BPF prog-id=188 op=UNLOAD Feb 9 19:54:21.076000 audit: BPF prog-id=187 op=UNLOAD Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:21.076000 audit: BPF prog-id=189 op=LOAD Feb 9 19:54:21.076000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000987b8 items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364663437393465346238316137376431356336313638366361616531 Feb 9 19:54:21.208021 env[1154]: time="2024-02-09T19:54:21.207965457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58df9d6994-lz7fq,Uid:e040a7a1-2b7f-44e9-89af-86f4016d35cf,Namespace:calico-system,Attempt:1,} returns sandbox id \"3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8\"" Feb 9 19:54:21.272249 systemd-networkd[1034]: calie2537541226: Gained IPv6LL Feb 9 19:54:21.295067 kubelet[2111]: I0209 19:54:21.294621 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-sldhf" podStartSLOduration=38.294570712 pod.CreationTimestamp="2024-02-09 19:53:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:54:21.290667528 +0000 UTC m=+52.790603772" watchObservedRunningTime="2024-02-09 19:54:21.294570712 +0000 UTC m=+52.794506946" Feb 9 19:54:21.376706 kubelet[2111]: I0209 19:54:21.376665 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-mql9n" podStartSLOduration=38.376612258 pod.CreationTimestamp="2024-02-09 19:53:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:54:21.375127978 +0000 UTC m=+52.875064214" watchObservedRunningTime="2024-02-09 19:54:21.376612258 +0000 UTC m=+52.876548488" Feb 9 19:54:21.628000 audit[4383]: NETFILTER_CFG table=filter:117 family=2 entries=12 op=nft_register_rule pid=4383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:21.628000 audit[4383]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff88ef7270 a2=0 a3=7fff88ef725c items=0 ppid=2323 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:21.634000 audit[4383]: NETFILTER_CFG table=nat:118 family=2 entries=30 op=nft_register_rule pid=4383 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:21.634000 audit[4383]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff88ef7270 a2=0 a3=7fff88ef725c items=0 ppid=2323 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:21.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:21.932591 env[1154]: time="2024-02-09T19:54:21.932415949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:21.936195 env[1154]: time="2024-02-09T19:54:21.936127466Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:21.939542 env[1154]: time="2024-02-09T19:54:21.939502728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:21.941681 env[1154]: time="2024-02-09T19:54:21.941637284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:21.944331 env[1154]: time="2024-02-09T19:54:21.943138927Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:54:21.946017 env[1154]: time="2024-02-09T19:54:21.945975277Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 19:54:21.949047 env[1154]: time="2024-02-09T19:54:21.948997377Z" level=info msg="CreateContainer within sandbox \"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:54:21.977448 systemd-networkd[1034]: cali50c0d546fe7: Gained IPv6LL Feb 9 19:54:21.981916 env[1154]: time="2024-02-09T19:54:21.981848633Z" level=info msg="CreateContainer within sandbox \"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5a2e07068bbd0e77088a68707bdd0f5e33a7a5d4661aa9beca48a3e45dd8b5f0\"" Feb 9 19:54:21.984219 env[1154]: time="2024-02-09T19:54:21.984173471Z" level=info msg="StartContainer for \"5a2e07068bbd0e77088a68707bdd0f5e33a7a5d4661aa9beca48a3e45dd8b5f0\"" Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.000000 audit: BPF prog-id=190 op=LOAD Feb 9 19:54:22.000000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5229c540 a2=70 a3=7f6f61642000 items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.000000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.029000 audit: BPF prog-id=190 op=UNLOAD Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit: BPF prog-id=191 op=LOAD Feb 9 19:54:22.029000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5229c540 a2=70 a3=6e items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.029000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.029000 audit: BPF prog-id=191 op=UNLOAD Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5229c4f0 a2=70 a3=7fff5229c540 items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.029000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit: BPF prog-id=192 op=LOAD Feb 9 19:54:22.029000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff5229c4d0 a2=70 a3=7fff5229c540 items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.029000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.029000 audit: BPF prog-id=192 op=UNLOAD Feb 9 19:54:22.029000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.029000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5229c5b0 a2=70 a3=0 items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.029000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5229c5a0 a2=70 a3=0 items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.030000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff5229c5e0 a2=70 a3=0 items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.030000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { perfmon } for pid=4426 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit[4426]: AVC avc: denied { bpf } for pid=4426 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.030000 audit: BPF prog-id=193 op=LOAD Feb 9 19:54:22.030000 audit[4426]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff5229c500 a2=70 a3=ffffffff items=0 ppid=4103 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.030000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:54:22.050000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.050000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe23256340 a2=70 a3=fff80800 items=0 ppid=4103 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.050000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:54:22.051000 audit[4438]: AVC avc: denied { bpf } for pid=4438 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.051000 audit[4438]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe23256210 a2=70 a3=3 items=0 ppid=4103 pid=4438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.051000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:54:22.072622 systemd[1]: Started cri-containerd-5a2e07068bbd0e77088a68707bdd0f5e33a7a5d4661aa9beca48a3e45dd8b5f0.scope. Feb 9 19:54:22.088000 audit[4442]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:22.088000 audit[4442]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffeab7d8c00 a2=0 a3=7ffeab7d8bec items=0 ppid=2323 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:22.094000 audit: BPF prog-id=193 op=UNLOAD Feb 9 19:54:22.094000 audit[4445]: SYSCALL arch=c000003e syscall=262 success=no exit=-2 a0=ffffffffffffff9c a1=c0000c03f0 a2=c00016c6b8 a3=100 items=0 ppid=4429 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc:[2:INIT]" exe=2F6D656D66643A72756E635F636C6F6E65643A2F70726F632F73656C662F657865202864656C6574656429 subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.102240 systemd-networkd[1034]: vxlan.calico: Link UP Feb 9 19:54:22.102252 systemd-networkd[1034]: vxlan.calico: Gained carrier Feb 9 19:54:22.094000 audit: PROCTITLE proctitle=72756E6300696E6974 Feb 9 19:54:22.113000 audit[4442]: NETFILTER_CFG table=nat:120 family=2 entries=63 op=nft_register_chain pid=4442 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:54:22.113000 audit[4442]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffeab7d8c00 a2=0 a3=7ffeab7d8bec items=0 ppid=2323 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3997 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561326530373036386262643065373730383861363837303762646430 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit: BPF prog-id=194 op=LOAD Feb 9 19:54:22.150000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a04c0 items=0 ppid=3997 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561326530373036386262643065373730383861363837303762646430 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit: BPF prog-id=195 op=LOAD Feb 9 19:54:22.150000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0508 items=0 ppid=3997 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561326530373036386262643065373730383861363837303762646430 Feb 9 19:54:22.150000 audit: BPF prog-id=195 op=UNLOAD Feb 9 19:54:22.150000 audit: BPF prog-id=194 op=UNLOAD Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { perfmon } for pid=4429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit[4429]: AVC avc: denied { bpf } for pid=4429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:22.150000 audit: BPF prog-id=196 op=LOAD Feb 9 19:54:22.150000 audit[4429]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0598 items=0 ppid=3997 pid=4429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561326530373036386262643065373730383861363837303762646430 Feb 9 19:54:22.187028 env[1154]: time="2024-02-09T19:54:22.186887822Z" level=info msg="StartContainer for \"5a2e07068bbd0e77088a68707bdd0f5e33a7a5d4661aa9beca48a3e45dd8b5f0\" returns successfully" Feb 9 19:54:22.348000 audit[4489]: NETFILTER_CFG table=mangle:121 family=2 entries=19 op=nft_register_chain pid=4489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:54:22.348000 audit[4489]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe90552fc0 a2=0 a3=7ffe90552fac items=0 ppid=4103 pid=4489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.348000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:54:22.352000 audit[4490]: NETFILTER_CFG table=nat:122 family=2 entries=16 op=nft_register_chain pid=4490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:54:22.356000 audit[4488]: NETFILTER_CFG table=raw:123 family=2 entries=19 op=nft_register_chain pid=4488 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:54:22.356000 audit[4488]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcf2ef7ac0 a2=0 a3=55f4887cf000 items=0 ppid=4103 pid=4488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.356000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:54:22.352000 audit[4490]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc53b5b8f0 a2=0 a3=55a1d863c000 items=0 ppid=4103 pid=4490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.352000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:54:22.374000 audit[4492]: NETFILTER_CFG table=filter:124 family=2 entries=157 op=nft_register_chain pid=4492 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:54:22.374000 audit[4492]: SYSCALL arch=c000003e syscall=46 success=yes exit=86820 a0=3 a1=7fffed746320 a2=0 a3=7fffed74630c items=0 ppid=4103 pid=4492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:22.374000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:54:22.614775 systemd-networkd[1034]: cali554e4b4d0fd: Gained IPv6LL Feb 9 19:54:23.576180 systemd-networkd[1034]: vxlan.calico: Gained IPv6LL Feb 9 19:54:23.787000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:23.787000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:23.787000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f7a720 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:23.787000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:23.787000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ed8420 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:23.787000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:24.869631 env[1154]: time="2024-02-09T19:54:24.869555273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:24.873601 env[1154]: time="2024-02-09T19:54:24.873548791Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:24.879178 env[1154]: time="2024-02-09T19:54:24.879134671Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:24.884377 env[1154]: time="2024-02-09T19:54:24.884330245Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:24.885179 env[1154]: time="2024-02-09T19:54:24.885117608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 19:54:24.886837 env[1154]: time="2024-02-09T19:54:24.886798599Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:54:24.912925 env[1154]: time="2024-02-09T19:54:24.912667861Z" level=info msg="CreateContainer within sandbox \"3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 19:54:24.940574 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2321021207.mount: Deactivated successfully. Feb 9 19:54:24.945550 env[1154]: time="2024-02-09T19:54:24.945496205Z" level=info msg="CreateContainer within sandbox \"3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75\"" Feb 9 19:54:24.946755 env[1154]: time="2024-02-09T19:54:24.946711203Z" level=info msg="StartContainer for \"caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75\"" Feb 9 19:54:24.988331 systemd[1]: Started cri-containerd-caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75.scope. Feb 9 19:54:25.037094 kernel: kauditd_printk_skb: 496 callbacks suppressed Feb 9 19:54:25.037262 kernel: audit: type=1400 audit(1707508465.029:1312): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.085214 kernel: audit: type=1400 audit(1707508465.029:1313): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.109115 kernel: audit: type=1400 audit(1707508465.029:1314): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.132135 kernel: audit: type=1400 audit(1707508465.029:1315): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.157547 kernel: audit: type=1400 audit(1707508465.029:1316): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.187236 kernel: audit: type=1400 audit(1707508465.029:1317): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.187383 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:54:25.187466 kernel: audit: type=1400 audit(1707508465.029:1318): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.187505 kernel: audit: audit_lost=107 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:54:25.187536 kernel: audit: backlog limit exceeded Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.058000 audit: BPF prog-id=197 op=LOAD Feb 9 19:54:25.226648 env[1154]: time="2024-02-09T19:54:25.226592863Z" level=info msg="StartContainer for \"caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75\" returns successfully" Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4297 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:25.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613135343330623438616361646262633462343861613436316165 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4297 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:25.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613135343330623438616361646262633462343861613436316165 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit: BPF prog-id=198 op=LOAD Feb 9 19:54:25.060000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024ca0 items=0 ppid=4297 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:25.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613135343330623438616361646262633462343861613436316165 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.060000 audit: BPF prog-id=199 op=LOAD Feb 9 19:54:25.060000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024ce8 items=0 ppid=4297 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:25.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613135343330623438616361646262633462343861613436316165 Feb 9 19:54:25.060000 audit: BPF prog-id=199 op=UNLOAD Feb 9 19:54:25.060000 audit: BPF prog-id=198 op=UNLOAD Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { perfmon } for pid=4504 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit[4504]: AVC avc: denied { bpf } for pid=4504 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.062000 audit: BPF prog-id=200 op=LOAD Feb 9 19:54:25.062000 audit[4504]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000250f8 items=0 ppid=4297 pid=4504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:25.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613135343330623438616361646262633462343861613436316165 Feb 9 19:54:25.156000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:25.156000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a3b28a0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:54:25.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:54:25.156000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:25.156000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00a3b2930 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:54:25.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:54:25.156000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:25.179000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:25.179000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00a4545a0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:54:25.156000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0030e0fc0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:54:25.156000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:54:25.179000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:54:25.423190 kubelet[2111]: I0209 19:54:25.423046 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-58df9d6994-lz7fq" podStartSLOduration=-9.223372001431786e+09 pod.CreationTimestamp="2024-02-09 19:53:50 +0000 UTC" firstStartedPulling="2024-02-09 19:54:21.212172835 +0000 UTC m=+52.712109045" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:54:25.334784193 +0000 UTC m=+56.834720427" watchObservedRunningTime="2024-02-09 19:54:25.422990803 +0000 UTC m=+56.922927041" Feb 9 19:54:26.478733 env[1154]: time="2024-02-09T19:54:26.478679007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:26.483155 env[1154]: time="2024-02-09T19:54:26.483109161Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:26.487041 env[1154]: time="2024-02-09T19:54:26.486994914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:26.490725 env[1154]: time="2024-02-09T19:54:26.490689785Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:26.491934 env[1154]: time="2024-02-09T19:54:26.491883084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:54:26.495661 env[1154]: time="2024-02-09T19:54:26.495619583Z" level=info msg="CreateContainer within sandbox \"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:54:26.520349 env[1154]: time="2024-02-09T19:54:26.520291218Z" level=info msg="CreateContainer within sandbox \"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"226d905b0c40187ad4b1ef6f9c87877fe8852201d16510d16bd1683751d2b3b1\"" Feb 9 19:54:26.521368 env[1154]: time="2024-02-09T19:54:26.521329364Z" level=info msg="StartContainer for \"226d905b0c40187ad4b1ef6f9c87877fe8852201d16510d16bd1683751d2b3b1\"" Feb 9 19:54:26.558409 systemd[1]: Started cri-containerd-226d905b0c40187ad4b1ef6f9c87877fe8852201d16510d16bd1683751d2b3b1.scope. Feb 9 19:54:26.574423 systemd[1]: run-containerd-runc-k8s.io-226d905b0c40187ad4b1ef6f9c87877fe8852201d16510d16bd1683751d2b3b1-runc.ejWfSh.mount: Deactivated successfully. Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3997 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:26.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366439303562306334303138376164346231656636663963383738 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit: BPF prog-id=201 op=LOAD Feb 9 19:54:26.625000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d22b0 items=0 ppid=3997 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:26.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366439303562306334303138376164346231656636663963383738 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit: BPF prog-id=202 op=LOAD Feb 9 19:54:26.625000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d22f8 items=0 ppid=3997 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:26.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366439303562306334303138376164346231656636663963383738 Feb 9 19:54:26.625000 audit: BPF prog-id=202 op=UNLOAD Feb 9 19:54:26.625000 audit: BPF prog-id=201 op=UNLOAD Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { perfmon } for pid=4560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit[4560]: AVC avc: denied { bpf } for pid=4560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.625000 audit: BPF prog-id=203 op=LOAD Feb 9 19:54:26.625000 audit[4560]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d2388 items=0 ppid=3997 pid=4560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:26.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366439303562306334303138376164346231656636663963383738 Feb 9 19:54:26.658981 env[1154]: time="2024-02-09T19:54:26.658923263Z" level=info msg="StartContainer for \"226d905b0c40187ad4b1ef6f9c87877fe8852201d16510d16bd1683751d2b3b1\" returns successfully" Feb 9 19:54:26.970243 kubelet[2111]: I0209 19:54:26.969741 2111 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:54:26.970243 kubelet[2111]: I0209 19:54:26.969790 2111 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:54:27.325180 kubelet[2111]: I0209 19:54:27.325020 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5k9nk" podStartSLOduration=-9.223371998529814e+09 pod.CreationTimestamp="2024-02-09 19:53:49 +0000 UTC" firstStartedPulling="2024-02-09 19:54:20.221556168 +0000 UTC m=+51.721492386" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:54:27.324143519 +0000 UTC m=+58.824079753" watchObservedRunningTime="2024-02-09 19:54:27.324962946 +0000 UTC m=+58.824899213" Feb 9 19:54:28.802091 env[1154]: time="2024-02-09T19:54:28.801984542Z" level=info msg="StopPodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\"" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.847 [WARNING][4612] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ed01e30-f309-4f72-8cb5-b2fd43215dfd", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3", Pod:"csi-node-driver-5k9nk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali44cd77cff98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.848 [INFO][4612] k8s.go 578: Cleaning up netns ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.848 [INFO][4612] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" iface="eth0" netns="" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.848 [INFO][4612] k8s.go 585: Releasing IP address(es) ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.848 [INFO][4612] utils.go 188: Calico CNI releasing IP address ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.874 [INFO][4618] ipam_plugin.go 415: Releasing address using handleID ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.875 [INFO][4618] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.875 [INFO][4618] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.884 [WARNING][4618] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.884 [INFO][4618] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.886 [INFO][4618] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:28.889568 env[1154]: 2024-02-09 19:54:28.888 [INFO][4612] k8s.go 591: Teardown processing complete. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.890443 env[1154]: time="2024-02-09T19:54:28.889617294Z" level=info msg="TearDown network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" successfully" Feb 9 19:54:28.890443 env[1154]: time="2024-02-09T19:54:28.889665207Z" level=info msg="StopPodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" returns successfully" Feb 9 19:54:28.890878 env[1154]: time="2024-02-09T19:54:28.890833783Z" level=info msg="RemovePodSandbox for \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\"" Feb 9 19:54:28.891149 env[1154]: time="2024-02-09T19:54:28.891041746Z" level=info msg="Forcibly stopping sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\"" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.940 [WARNING][4637] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1ed01e30-f309-4f72-8cb5-b2fd43215dfd", ResourceVersion:"868", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"d1d5ad23c2a1be8905d2fa2edf480c63f720f2bf9aa9a421e01154045210fdc3", Pod:"csi-node-driver-5k9nk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.61.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali44cd77cff98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.941 [INFO][4637] k8s.go 578: Cleaning up netns ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.941 [INFO][4637] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" iface="eth0" netns="" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.941 [INFO][4637] k8s.go 585: Releasing IP address(es) ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.941 [INFO][4637] utils.go 188: Calico CNI releasing IP address ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.967 [INFO][4643] ipam_plugin.go 415: Releasing address using handleID ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.967 [INFO][4643] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.967 [INFO][4643] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.982 [WARNING][4643] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.982 [INFO][4643] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" HandleID="k8s-pod-network.b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-csi--node--driver--5k9nk-eth0" Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.984 [INFO][4643] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:28.987237 env[1154]: 2024-02-09 19:54:28.986 [INFO][4637] k8s.go 591: Teardown processing complete. ContainerID="b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f" Feb 9 19:54:28.988121 env[1154]: time="2024-02-09T19:54:28.987265734Z" level=info msg="TearDown network for sandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" successfully" Feb 9 19:54:28.991921 env[1154]: time="2024-02-09T19:54:28.991872805Z" level=info msg="RemovePodSandbox \"b87ab33efd37b656354908b047dc2bdfd3b08dc288e8e401d9ee46aa3cc3fa1f\" returns successfully" Feb 9 19:54:28.992593 env[1154]: time="2024-02-09T19:54:28.992531154Z" level=info msg="StopPodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\"" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.045 [WARNING][4665] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b5dceea0-71b1-4028-9c85-42486fce2908", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c", Pod:"coredns-787d4945fb-mql9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie2537541226", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.046 [INFO][4665] k8s.go 578: Cleaning up netns ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.046 [INFO][4665] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" iface="eth0" netns="" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.046 [INFO][4665] k8s.go 585: Releasing IP address(es) ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.046 [INFO][4665] utils.go 188: Calico CNI releasing IP address ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.070 [INFO][4672] ipam_plugin.go 415: Releasing address using handleID ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.070 [INFO][4672] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.070 [INFO][4672] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.079 [WARNING][4672] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.079 [INFO][4672] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.081 [INFO][4672] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:29.085449 env[1154]: 2024-02-09 19:54:29.082 [INFO][4665] k8s.go 591: Teardown processing complete. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.085449 env[1154]: time="2024-02-09T19:54:29.083930538Z" level=info msg="TearDown network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" successfully" Feb 9 19:54:29.085449 env[1154]: time="2024-02-09T19:54:29.083975885Z" level=info msg="StopPodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" returns successfully" Feb 9 19:54:29.086513 env[1154]: time="2024-02-09T19:54:29.085642226Z" level=info msg="RemovePodSandbox for \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\"" Feb 9 19:54:29.086513 env[1154]: time="2024-02-09T19:54:29.085690454Z" level=info msg="Forcibly stopping sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\"" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.134 [WARNING][4691] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"b5dceea0-71b1-4028-9c85-42486fce2908", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"1f02e15fd02b0ab9232cfa6e5209007fd5a0fae3f2ceb5d6d0adb3e9ccc4a71c", Pod:"coredns-787d4945fb-mql9n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie2537541226", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.134 [INFO][4691] k8s.go 578: Cleaning up netns ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.134 [INFO][4691] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" iface="eth0" netns="" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.134 [INFO][4691] k8s.go 585: Releasing IP address(es) ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.134 [INFO][4691] utils.go 188: Calico CNI releasing IP address ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.183 [INFO][4697] ipam_plugin.go 415: Releasing address using handleID ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.183 [INFO][4697] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.183 [INFO][4697] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.192 [WARNING][4697] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.192 [INFO][4697] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" HandleID="k8s-pod-network.9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--mql9n-eth0" Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.194 [INFO][4697] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:29.197218 env[1154]: 2024-02-09 19:54:29.195 [INFO][4691] k8s.go 591: Teardown processing complete. ContainerID="9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac" Feb 9 19:54:29.198176 env[1154]: time="2024-02-09T19:54:29.197255134Z" level=info msg="TearDown network for sandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" successfully" Feb 9 19:54:29.202766 env[1154]: time="2024-02-09T19:54:29.202710026Z" level=info msg="RemovePodSandbox \"9519b97def427bb2d4fe6b4cbc3332ee2e35c8b1f5ac110fc79c9f4e7ddca9ac\" returns successfully" Feb 9 19:54:29.203415 env[1154]: time="2024-02-09T19:54:29.203375237Z" level=info msg="StopPodSandbox for \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\"" Feb 9 19:54:29.203743 env[1154]: time="2024-02-09T19:54:29.203668654Z" level=info msg="TearDown network for sandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" successfully" Feb 9 19:54:29.203860 env[1154]: time="2024-02-09T19:54:29.203738136Z" level=info msg="StopPodSandbox for \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" returns successfully" Feb 9 19:54:29.204159 env[1154]: time="2024-02-09T19:54:29.204123999Z" level=info msg="RemovePodSandbox for \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\"" Feb 9 19:54:29.204287 env[1154]: time="2024-02-09T19:54:29.204162583Z" level=info msg="Forcibly stopping sandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\"" Feb 9 19:54:29.204346 env[1154]: time="2024-02-09T19:54:29.204282318Z" level=info msg="TearDown network for sandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" successfully" Feb 9 19:54:29.208903 env[1154]: time="2024-02-09T19:54:29.208846517Z" level=info msg="RemovePodSandbox \"ec18769d8cabffee8f42fdb6e85085017aa8a5bc958ae170de0a44fa44df3873\" returns successfully" Feb 9 19:54:29.209344 env[1154]: time="2024-02-09T19:54:29.209298765Z" level=info msg="StopPodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\"" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.262 [WARNING][4716] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9b9a7006-b875-4858-8615-5296e26fc901", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93", Pod:"coredns-787d4945fb-sldhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50c0d546fe7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.262 [INFO][4716] k8s.go 578: Cleaning up netns ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.262 [INFO][4716] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" iface="eth0" netns="" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.262 [INFO][4716] k8s.go 585: Releasing IP address(es) ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.262 [INFO][4716] utils.go 188: Calico CNI releasing IP address ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.288 [INFO][4722] ipam_plugin.go 415: Releasing address using handleID ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.288 [INFO][4722] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.288 [INFO][4722] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.296 [WARNING][4722] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.296 [INFO][4722] ipam_plugin.go 443: Releasing address using workloadID ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.300 [INFO][4722] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:29.302716 env[1154]: 2024-02-09 19:54:29.301 [INFO][4716] k8s.go 591: Teardown processing complete. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.303641 env[1154]: time="2024-02-09T19:54:29.302748915Z" level=info msg="TearDown network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" successfully" Feb 9 19:54:29.303641 env[1154]: time="2024-02-09T19:54:29.302793634Z" level=info msg="StopPodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" returns successfully" Feb 9 19:54:29.303641 env[1154]: time="2024-02-09T19:54:29.303431459Z" level=info msg="RemovePodSandbox for \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\"" Feb 9 19:54:29.303641 env[1154]: time="2024-02-09T19:54:29.303475467Z" level=info msg="Forcibly stopping sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\"" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.355 [WARNING][4741] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9b9a7006-b875-4858-8615-5296e26fc901", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"cf0979c2ffdfb0e459ae2abd68b629fa8738d82302073c7254740cb858215d93", Pod:"coredns-787d4945fb-sldhf", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.61.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali50c0d546fe7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.355 [INFO][4741] k8s.go 578: Cleaning up netns ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.356 [INFO][4741] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" iface="eth0" netns="" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.356 [INFO][4741] k8s.go 585: Releasing IP address(es) ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.356 [INFO][4741] utils.go 188: Calico CNI releasing IP address ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.385 [INFO][4747] ipam_plugin.go 415: Releasing address using handleID ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.385 [INFO][4747] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.385 [INFO][4747] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.395 [WARNING][4747] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.395 [INFO][4747] ipam_plugin.go 443: Releasing address using workloadID ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" HandleID="k8s-pod-network.21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-coredns--787d4945fb--sldhf-eth0" Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.397 [INFO][4747] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:29.403804 env[1154]: 2024-02-09 19:54:29.398 [INFO][4741] k8s.go 591: Teardown processing complete. ContainerID="21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8" Feb 9 19:54:29.403804 env[1154]: time="2024-02-09T19:54:29.400386919Z" level=info msg="TearDown network for sandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" successfully" Feb 9 19:54:29.406884 env[1154]: time="2024-02-09T19:54:29.406824539Z" level=info msg="RemovePodSandbox \"21c7b2fef2354e0fc53eb6cf93f49bad1b30400f1d5202911a4dfe13d6a860a8\" returns successfully" Feb 9 19:54:29.407503 env[1154]: time="2024-02-09T19:54:29.407461177Z" level=info msg="StopPodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\"" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.455 [WARNING][4765] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0", GenerateName:"calico-kube-controllers-58df9d6994-", Namespace:"calico-system", SelfLink:"", UID:"e040a7a1-2b7f-44e9-89af-86f4016d35cf", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58df9d6994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8", Pod:"calico-kube-controllers-58df9d6994-lz7fq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali554e4b4d0fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.455 [INFO][4765] k8s.go 578: Cleaning up netns ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.455 [INFO][4765] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" iface="eth0" netns="" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.455 [INFO][4765] k8s.go 585: Releasing IP address(es) ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.455 [INFO][4765] utils.go 188: Calico CNI releasing IP address ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.479 [INFO][4772] ipam_plugin.go 415: Releasing address using handleID ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.479 [INFO][4772] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.479 [INFO][4772] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.488 [WARNING][4772] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.488 [INFO][4772] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.490 [INFO][4772] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:29.492598 env[1154]: 2024-02-09 19:54:29.491 [INFO][4765] k8s.go 591: Teardown processing complete. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.493896 env[1154]: time="2024-02-09T19:54:29.492618429Z" level=info msg="TearDown network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" successfully" Feb 9 19:54:29.493896 env[1154]: time="2024-02-09T19:54:29.492659530Z" level=info msg="StopPodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" returns successfully" Feb 9 19:54:29.493896 env[1154]: time="2024-02-09T19:54:29.493256496Z" level=info msg="RemovePodSandbox for \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\"" Feb 9 19:54:29.493896 env[1154]: time="2024-02-09T19:54:29.493376489Z" level=info msg="Forcibly stopping sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\"" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.535 [WARNING][4790] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0", GenerateName:"calico-kube-controllers-58df9d6994-", Namespace:"calico-system", SelfLink:"", UID:"e040a7a1-2b7f-44e9-89af-86f4016d35cf", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58df9d6994", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"3df4794e4b81a77d15c61686caae1df4a1ea1d976031450ab1656ba50feec2b8", Pod:"calico-kube-controllers-58df9d6994-lz7fq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.61.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali554e4b4d0fd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.535 [INFO][4790] k8s.go 578: Cleaning up netns ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.535 [INFO][4790] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" iface="eth0" netns="" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.535 [INFO][4790] k8s.go 585: Releasing IP address(es) ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.535 [INFO][4790] utils.go 188: Calico CNI releasing IP address ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.564 [INFO][4796] ipam_plugin.go 415: Releasing address using handleID ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.564 [INFO][4796] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.565 [INFO][4796] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.573 [WARNING][4796] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.573 [INFO][4796] ipam_plugin.go 443: Releasing address using workloadID ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" HandleID="k8s-pod-network.52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--kube--controllers--58df9d6994--lz7fq-eth0" Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.575 [INFO][4796] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:54:29.578424 env[1154]: 2024-02-09 19:54:29.576 [INFO][4790] k8s.go 591: Teardown processing complete. ContainerID="52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1" Feb 9 19:54:29.579285 env[1154]: time="2024-02-09T19:54:29.578463609Z" level=info msg="TearDown network for sandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" successfully" Feb 9 19:54:29.583341 env[1154]: time="2024-02-09T19:54:29.583289969Z" level=info msg="RemovePodSandbox \"52fec6c7cc153c92dacdfe7dccc92969ce2ff4c07bc76544771b29133b63a8f1\" returns successfully" Feb 9 19:54:29.584241 env[1154]: time="2024-02-09T19:54:29.584199727Z" level=info msg="StopPodSandbox for \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\"" Feb 9 19:54:29.584442 env[1154]: time="2024-02-09T19:54:29.584332277Z" level=info msg="TearDown network for sandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" successfully" Feb 9 19:54:29.584442 env[1154]: time="2024-02-09T19:54:29.584390961Z" level=info msg="StopPodSandbox for \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" returns successfully" Feb 9 19:54:29.585251 env[1154]: time="2024-02-09T19:54:29.585214037Z" level=info msg="RemovePodSandbox for \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\"" Feb 9 19:54:29.585465 env[1154]: time="2024-02-09T19:54:29.585400216Z" level=info msg="Forcibly stopping sandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\"" Feb 9 19:54:29.585583 env[1154]: time="2024-02-09T19:54:29.585534376Z" level=info msg="TearDown network for sandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" successfully" Feb 9 19:54:29.590730 env[1154]: time="2024-02-09T19:54:29.590666065Z" level=info msg="RemovePodSandbox \"3ecbbf639294e74db4c747d466cce83f835d32474c46c7f77bd8ea127d9260c5\" returns successfully" Feb 9 19:54:31.640000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.646988 kernel: kauditd_printk_skb: 108 callbacks suppressed Feb 9 19:54:31.647140 kernel: audit: type=1400 audit(1707508471.640:1340): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.640000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002055680 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.707069 kernel: audit: type=1300 audit(1707508471.640:1340): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002055680 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.707251 kernel: audit: type=1327 audit(1707508471.640:1340): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:31.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:31.647000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.770110 kernel: audit: type=1400 audit(1707508471.647:1341): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.770285 kernel: audit: type=1300 audit(1707508471.647:1341): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00228b3e0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.647000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00228b3e0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:31.833433 kernel: audit: type=1327 audit(1707508471.647:1341): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:31.833630 kernel: audit: type=1400 audit(1707508471.653:1342): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.653000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.653000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00228b500 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.894224 kernel: audit: type=1300 audit(1707508471.653:1342): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00228b500 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:31.923790 kernel: audit: type=1327 audit(1707508471.653:1342): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:31.923990 kernel: audit: type=1400 audit(1707508471.658:1343): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.658000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:54:31.658000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020556a0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:54:31.658000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:54:35.592657 systemd[1]: run-containerd-runc-k8s.io-caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75-runc.1qdeoH.mount: Deactivated successfully. Feb 9 19:54:40.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.37:22-147.75.109.163:39036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.700476 systemd[1]: Started sshd@7-10.128.0.37:22-147.75.109.163:39036.service. Feb 9 19:54:40.706108 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:54:40.706232 kernel: audit: type=1130 audit(1707508480.699:1344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.37:22-147.75.109.163:39036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.988000 audit[4834]: USER_ACCT pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:40.990667 sshd[4834]: Accepted publickey for core from 147.75.109.163 port 39036 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:41.021282 kernel: audit: type=1101 audit(1707508480.988:1345): pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.023904 sshd[4834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:41.021000 audit[4834]: CRED_ACQ pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.034861 systemd[1]: Started session-8.scope. Feb 9 19:54:41.036865 systemd-logind[1141]: New session 8 of user core. Feb 9 19:54:41.050244 kernel: audit: type=1103 audit(1707508481.021:1346): pid=4834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.068124 kernel: audit: type=1006 audit(1707508481.021:1347): pid=4834 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 9 19:54:41.068337 kernel: audit: type=1300 audit(1707508481.021:1347): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d8b7250 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:41.021000 audit[4834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d8b7250 a2=3 a3=0 items=0 ppid=1 pid=4834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:41.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:41.104753 kernel: audit: type=1327 audit(1707508481.021:1347): proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:41.046000 audit[4834]: USER_START pid=4834 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.137677 kernel: audit: type=1105 audit(1707508481.046:1348): pid=4834 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.050000 audit[4836]: CRED_ACQ pid=4836 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.162127 kernel: audit: type=1103 audit(1707508481.050:1349): pid=4836 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.338066 sshd[4834]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:41.339000 audit[4834]: USER_END pid=4834 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.344210 systemd[1]: sshd@7-10.128.0.37:22-147.75.109.163:39036.service: Deactivated successfully. Feb 9 19:54:41.345582 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:54:41.348959 systemd-logind[1141]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:54:41.351524 systemd-logind[1141]: Removed session 8. Feb 9 19:54:41.339000 audit[4834]: CRED_DISP pid=4834 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.398200 kernel: audit: type=1106 audit(1707508481.339:1350): pid=4834 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.398394 kernel: audit: type=1104 audit(1707508481.339:1351): pid=4834 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:41.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.37:22-147.75.109.163:39036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:46.385635 systemd[1]: Started sshd@8-10.128.0.37:22-147.75.109.163:58974.service. Feb 9 19:54:46.416815 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:54:46.416990 kernel: audit: type=1130 audit(1707508486.385:1353): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.37:22-147.75.109.163:58974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:46.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.37:22-147.75.109.163:58974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:46.684000 audit[4880]: USER_ACCT pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.716229 kernel: audit: type=1101 audit(1707508486.684:1354): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.717144 sshd[4880]: Accepted publickey for core from 147.75.109.163 port 58974 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:46.716981 sshd[4880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:46.715000 audit[4880]: CRED_ACQ pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.729391 systemd[1]: Started session-9.scope. Feb 9 19:54:46.731422 systemd-logind[1141]: New session 9 of user core. Feb 9 19:54:46.745435 kernel: audit: type=1103 audit(1707508486.715:1355): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.763876 kernel: audit: type=1006 audit(1707508486.715:1356): pid=4880 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 9 19:54:46.764031 kernel: audit: type=1300 audit(1707508486.715:1356): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce5d92e0 a2=3 a3=0 items=0 ppid=1 pid=4880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:46.715000 audit[4880]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce5d92e0 a2=3 a3=0 items=0 ppid=1 pid=4880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:46.715000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:46.791204 kernel: audit: type=1327 audit(1707508486.715:1356): proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:46.738000 audit[4880]: USER_START pid=4880 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.833091 kernel: audit: type=1105 audit(1707508486.738:1357): pid=4880 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.738000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:46.859197 kernel: audit: type=1103 audit(1707508486.738:1358): pid=4882 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:47.009435 sshd[4880]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:47.010000 audit[4880]: USER_END pid=4880 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:47.045098 kernel: audit: type=1106 audit(1707508487.010:1359): pid=4880 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:47.047540 kernel: audit: type=1104 audit(1707508487.010:1360): pid=4880 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:47.010000 audit[4880]: CRED_DISP pid=4880 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:47.045643 systemd[1]: sshd@8-10.128.0.37:22-147.75.109.163:58974.service: Deactivated successfully. Feb 9 19:54:47.046895 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:54:47.053985 systemd-logind[1141]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:54:47.055798 systemd-logind[1141]: Removed session 9. Feb 9 19:54:47.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.37:22-147.75.109.163:58974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:52.058701 systemd[1]: Started sshd@9-10.128.0.37:22-147.75.109.163:58990.service. Feb 9 19:54:52.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.37:22-147.75.109.163:58990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:52.064903 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:54:52.065057 kernel: audit: type=1130 audit(1707508492.058:1362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.37:22-147.75.109.163:58990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:52.355000 audit[4894]: USER_ACCT pid=4894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.359056 sshd[4894]: Accepted publickey for core from 147.75.109.163 port 58990 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:52.387230 kernel: audit: type=1101 audit(1707508492.355:1363): pid=4894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.387984 sshd[4894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:52.400016 systemd[1]: Started session-10.scope. Feb 9 19:54:52.400427 systemd-logind[1141]: New session 10 of user core. Feb 9 19:54:52.385000 audit[4894]: CRED_ACQ pid=4894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.431048 kernel: audit: type=1103 audit(1707508492.385:1364): pid=4894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.450594 kernel: audit: type=1006 audit(1707508492.385:1365): pid=4894 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 9 19:54:52.385000 audit[4894]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ebc80e0 a2=3 a3=0 items=0 ppid=1 pid=4894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:52.385000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:52.491001 kernel: audit: type=1300 audit(1707508492.385:1365): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4ebc80e0 a2=3 a3=0 items=0 ppid=1 pid=4894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:52.491188 kernel: audit: type=1327 audit(1707508492.385:1365): proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:52.491236 kernel: audit: type=1105 audit(1707508492.411:1366): pid=4894 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.411000 audit[4894]: USER_START pid=4894 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.431000 audit[4897]: CRED_ACQ pid=4897 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.526117 kernel: audit: type=1103 audit(1707508492.431:1367): pid=4897 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.742438 sshd[4894]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:52.743000 audit[4894]: USER_END pid=4894 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.748379 systemd-logind[1141]: Session 10 logged out. Waiting for processes to exit. Feb 9 19:54:52.750040 systemd[1]: sshd@9-10.128.0.37:22-147.75.109.163:58990.service: Deactivated successfully. Feb 9 19:54:52.751256 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 19:54:52.753222 systemd-logind[1141]: Removed session 10. Feb 9 19:54:52.787158 kernel: audit: type=1106 audit(1707508492.743:1368): pid=4894 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.787370 kernel: audit: type=1104 audit(1707508492.743:1369): pid=4894 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.743000 audit[4894]: CRED_DISP pid=4894 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:52.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.37:22-147.75.109.163:58990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:57.067642 systemd[1]: run-containerd-runc-k8s.io-caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75-runc.I1OL0m.mount: Deactivated successfully. Feb 9 19:54:57.789534 systemd[1]: Started sshd@10-10.128.0.37:22-147.75.109.163:56972.service. Feb 9 19:54:57.822211 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:54:57.822475 kernel: audit: type=1130 audit(1707508497.788:1371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.37:22-147.75.109.163:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:57.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.37:22-147.75.109.163:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:58.078000 audit[4926]: USER_ACCT pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.080741 sshd[4926]: Accepted publickey for core from 147.75.109.163 port 56972 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:58.110164 kernel: audit: type=1101 audit(1707508498.078:1372): pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.110865 sshd[4926]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:58.109000 audit[4926]: CRED_ACQ pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.128713 systemd[1]: Started session-11.scope. Feb 9 19:54:58.131548 systemd-logind[1141]: New session 11 of user core. Feb 9 19:54:58.137121 kernel: audit: type=1103 audit(1707508498.109:1373): pid=4926 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.156814 kernel: audit: type=1006 audit(1707508498.109:1374): pid=4926 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 9 19:54:58.156999 kernel: audit: type=1300 audit(1707508498.109:1374): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde0162ff0 a2=3 a3=0 items=0 ppid=1 pid=4926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:58.109000 audit[4926]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde0162ff0 a2=3 a3=0 items=0 ppid=1 pid=4926 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:58.109000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:58.186553 kernel: audit: type=1327 audit(1707508498.109:1374): proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:58.138000 audit[4926]: USER_START pid=4926 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.227139 kernel: audit: type=1105 audit(1707508498.138:1375): pid=4926 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.227395 kernel: audit: type=1103 audit(1707508498.144:1376): pid=4928 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.144000 audit[4928]: CRED_ACQ pid=4928 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.400169 sshd[4926]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:58.401000 audit[4926]: USER_END pid=4926 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.407796 systemd[1]: sshd@10-10.128.0.37:22-147.75.109.163:56972.service: Deactivated successfully. Feb 9 19:54:58.410017 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 19:54:58.413503 systemd-logind[1141]: Session 11 logged out. Waiting for processes to exit. Feb 9 19:54:58.415252 systemd-logind[1141]: Removed session 11. Feb 9 19:54:58.439974 kernel: audit: type=1106 audit(1707508498.401:1377): pid=4926 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.440203 kernel: audit: type=1104 audit(1707508498.401:1378): pid=4926 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.401000 audit[4926]: CRED_DISP pid=4926 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:58.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.37:22-147.75.109.163:56972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:03.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.37:22-147.75.109.163:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:03.447887 systemd[1]: Started sshd@11-10.128.0.37:22-147.75.109.163:56978.service. Feb 9 19:55:03.453658 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:55:03.453806 kernel: audit: type=1130 audit(1707508503.447:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.37:22-147.75.109.163:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:03.744000 audit[4948]: USER_ACCT pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.747359 sshd[4948]: Accepted publickey for core from 147.75.109.163 port 56978 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:03.777113 kernel: audit: type=1101 audit(1707508503.744:1381): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.775000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.778181 sshd[4948]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:03.791663 systemd[1]: Started session-12.scope. Feb 9 19:55:03.793165 systemd-logind[1141]: New session 12 of user core. Feb 9 19:55:03.804662 kernel: audit: type=1103 audit(1707508503.775:1382): pid=4948 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.822139 kernel: audit: type=1006 audit(1707508503.775:1383): pid=4948 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 9 19:55:03.822310 kernel: audit: type=1300 audit(1707508503.775:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c662210 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:03.775000 audit[4948]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c662210 a2=3 a3=0 items=0 ppid=1 pid=4948 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:03.775000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:03.802000 audit[4948]: USER_START pid=4948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.893313 kernel: audit: type=1327 audit(1707508503.775:1383): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:03.893501 kernel: audit: type=1105 audit(1707508503.802:1384): pid=4948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.894122 kernel: audit: type=1103 audit(1707508503.806:1385): pid=4950 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:03.806000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:04.059804 sshd[4948]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:04.061000 audit[4948]: USER_END pid=4948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:04.065450 systemd[1]: sshd@11-10.128.0.37:22-147.75.109.163:56978.service: Deactivated successfully. Feb 9 19:55:04.066681 systemd[1]: session-12.scope: Deactivated successfully. Feb 9 19:55:04.069103 systemd-logind[1141]: Session 12 logged out. Waiting for processes to exit. Feb 9 19:55:04.070843 systemd-logind[1141]: Removed session 12. Feb 9 19:55:04.061000 audit[4948]: CRED_DISP pid=4948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:04.119873 kernel: audit: type=1106 audit(1707508504.061:1386): pid=4948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:04.120062 kernel: audit: type=1104 audit(1707508504.061:1387): pid=4948 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:04.061000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.37:22-147.75.109.163:56978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:05.590388 systemd[1]: run-containerd-runc-k8s.io-caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75-runc.koVrcH.mount: Deactivated successfully. Feb 9 19:55:09.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.37:22-147.75.109.163:45818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:09.106925 systemd[1]: Started sshd@12-10.128.0.37:22-147.75.109.163:45818.service. Feb 9 19:55:09.113456 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:55:09.113584 kernel: audit: type=1130 audit(1707508509.107:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.37:22-147.75.109.163:45818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:09.395000 audit[4981]: USER_ACCT pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.398488 sshd[4981]: Accepted publickey for core from 147.75.109.163 port 45818 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:09.425000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.427938 sshd[4981]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:09.436433 systemd[1]: Started session-13.scope. Feb 9 19:55:09.438153 systemd-logind[1141]: New session 13 of user core. Feb 9 19:55:09.454109 kernel: audit: type=1101 audit(1707508509.395:1390): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.454251 kernel: audit: type=1103 audit(1707508509.425:1391): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.454306 kernel: audit: type=1006 audit(1707508509.426:1392): pid=4981 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 9 19:55:09.426000 audit[4981]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd56cc8700 a2=3 a3=0 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:09.498781 kernel: audit: type=1300 audit(1707508509.426:1392): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd56cc8700 a2=3 a3=0 items=0 ppid=1 pid=4981 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:09.426000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:09.450000 audit[4981]: USER_START pid=4981 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.542902 kernel: audit: type=1327 audit(1707508509.426:1392): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:09.543144 kernel: audit: type=1105 audit(1707508509.450:1393): pid=4981 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.454000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.568165 kernel: audit: type=1103 audit(1707508509.454:1394): pid=4983 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.701822 sshd[4981]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:09.702000 audit[4981]: USER_END pid=4981 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.707359 systemd-logind[1141]: Session 13 logged out. Waiting for processes to exit. Feb 9 19:55:09.709473 systemd[1]: sshd@12-10.128.0.37:22-147.75.109.163:45818.service: Deactivated successfully. Feb 9 19:55:09.710660 systemd[1]: session-13.scope: Deactivated successfully. Feb 9 19:55:09.712686 systemd-logind[1141]: Removed session 13. Feb 9 19:55:09.702000 audit[4981]: CRED_DISP pid=4981 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.737190 kernel: audit: type=1106 audit(1707508509.702:1395): pid=4981 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.737266 kernel: audit: type=1104 audit(1707508509.702:1396): pid=4981 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:09.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.37:22-147.75.109.163:45818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:14.748738 systemd[1]: Started sshd@13-10.128.0.37:22-147.75.109.163:39314.service. Feb 9 19:55:14.783792 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:55:14.783891 kernel: audit: type=1130 audit(1707508514.747:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.37:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:14.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.37:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:15.035000 audit[4997]: USER_ACCT pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.067193 kernel: audit: type=1101 audit(1707508515.035:1399): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.067335 sshd[4997]: Accepted publickey for core from 147.75.109.163 port 39314 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:15.066000 audit[4997]: CRED_ACQ pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.068677 sshd[4997]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:15.077490 systemd[1]: Started session-14.scope. Feb 9 19:55:15.080529 systemd-logind[1141]: New session 14 of user core. Feb 9 19:55:15.110175 kernel: audit: type=1103 audit(1707508515.066:1400): pid=4997 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.110361 kernel: audit: type=1006 audit(1707508515.066:1401): pid=4997 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 9 19:55:15.066000 audit[4997]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8e2084d0 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:15.139246 kernel: audit: type=1300 audit(1707508515.066:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8e2084d0 a2=3 a3=0 items=0 ppid=1 pid=4997 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:15.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:15.161553 kernel: audit: type=1327 audit(1707508515.066:1401): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:15.161713 kernel: audit: type=1105 audit(1707508515.087:1402): pid=4997 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.087000 audit[4997]: USER_START pid=4997 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.170938 systemd[1]: run-containerd-runc-k8s.io-e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9-runc.U1zI1S.mount: Deactivated successfully. Feb 9 19:55:15.092000 audit[4999]: CRED_ACQ pid=4999 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.206001 kernel: audit: type=1103 audit(1707508515.092:1403): pid=4999 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.361255 sshd[4997]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:15.363000 audit[4997]: USER_END pid=4997 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.397104 kernel: audit: type=1106 audit(1707508515.363:1404): pid=4997 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.363000 audit[4997]: CRED_DISP pid=4997 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.398843 systemd[1]: sshd@13-10.128.0.37:22-147.75.109.163:39314.service: Deactivated successfully. Feb 9 19:55:15.400054 systemd[1]: session-14.scope: Deactivated successfully. Feb 9 19:55:15.402164 systemd-logind[1141]: Session 14 logged out. Waiting for processes to exit. Feb 9 19:55:15.403861 systemd-logind[1141]: Removed session 14. Feb 9 19:55:15.423133 kernel: audit: type=1104 audit(1707508515.363:1405): pid=4997 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:15.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.37:22-147.75.109.163:39314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:20.411943 systemd[1]: Started sshd@14-10.128.0.37:22-147.75.109.163:39316.service. Feb 9 19:55:20.443571 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:55:20.443698 kernel: audit: type=1130 audit(1707508520.411:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.37:22-147.75.109.163:39316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:20.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.37:22-147.75.109.163:39316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:20.705000 audit[5032]: USER_ACCT pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.736624 sshd[5032]: Accepted publickey for core from 147.75.109.163 port 39316 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:20.737097 kernel: audit: type=1101 audit(1707508520.705:1408): pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.737597 sshd[5032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:20.735000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.746213 systemd[1]: Started session-15.scope. Feb 9 19:55:20.747249 systemd-logind[1141]: New session 15 of user core. Feb 9 19:55:20.781024 kernel: audit: type=1103 audit(1707508520.735:1409): pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.781261 kernel: audit: type=1006 audit(1707508520.735:1410): pid=5032 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 9 19:55:20.781337 kernel: audit: type=1300 audit(1707508520.735:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec535f750 a2=3 a3=0 items=0 ppid=1 pid=5032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:20.735000 audit[5032]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec535f750 a2=3 a3=0 items=0 ppid=1 pid=5032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:20.735000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:20.810235 kernel: audit: type=1327 audit(1707508520.735:1410): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:20.819329 kernel: audit: type=1105 audit(1707508520.752:1411): pid=5032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.752000 audit[5032]: USER_START pid=5032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.757000 audit[5034]: CRED_ACQ pid=5034 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:20.878275 kernel: audit: type=1103 audit(1707508520.757:1412): pid=5034 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:21.076809 sshd[5032]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:21.078000 audit[5032]: USER_END pid=5032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:21.081000 audit[5032]: CRED_DISP pid=5032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:21.124340 systemd[1]: sshd@14-10.128.0.37:22-147.75.109.163:39316.service: Deactivated successfully. Feb 9 19:55:21.125560 systemd[1]: session-15.scope: Deactivated successfully. Feb 9 19:55:21.137892 kernel: audit: type=1106 audit(1707508521.078:1413): pid=5032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:21.138042 kernel: audit: type=1104 audit(1707508521.081:1414): pid=5032 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:21.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.37:22-147.75.109.163:39316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:21.139800 systemd-logind[1141]: Session 15 logged out. Waiting for processes to exit. Feb 9 19:55:21.143598 systemd-logind[1141]: Removed session 15. Feb 9 19:55:23.789000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:23.789000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:23.789000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000967320 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:23.789000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:23.789000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00097c030 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:23.789000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:25.159000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:25.159000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bf3dcb0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:55:25.159000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:55:25.159000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:25.159000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bf3dce0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:55:25.159000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:55:25.189000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:25.189000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:25.189000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c002abf240 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:55:25.189000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:55:25.189000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bf3de00 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:55:25.189000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:55:25.230000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:25.230000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c002abf2a0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:55:25.230000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:55:25.230000 audit[1989]: AVC avc: denied { watch } for pid=1989 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:25.230000 audit[1989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00bddccf0 a2=fc6 a3=0 items=0 ppid=1838 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c689,c808 key=(null) Feb 9 19:55:25.230000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 9 19:55:26.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.37:22-147.75.109.163:50998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:26.121380 systemd[1]: Started sshd@15-10.128.0.37:22-147.75.109.163:50998.service. Feb 9 19:55:26.127238 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 9 19:55:26.127346 kernel: audit: type=1130 audit(1707508526.120:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.37:22-147.75.109.163:50998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:26.412000 audit[5046]: USER_ACCT pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.443736 sshd[5046]: Accepted publickey for core from 147.75.109.163 port 50998 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:26.444193 kernel: audit: type=1101 audit(1707508526.412:1425): pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.444454 sshd[5046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:26.442000 audit[5046]: CRED_ACQ pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.454719 systemd-logind[1141]: New session 16 of user core. Feb 9 19:55:26.455439 systemd[1]: Started session-16.scope. Feb 9 19:55:26.474289 kernel: audit: type=1103 audit(1707508526.442:1426): pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.442000 audit[5046]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedc808000 a2=3 a3=0 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:26.519048 kernel: audit: type=1006 audit(1707508526.442:1427): pid=5046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 9 19:55:26.519205 kernel: audit: type=1300 audit(1707508526.442:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedc808000 a2=3 a3=0 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:26.519283 kernel: audit: type=1327 audit(1707508526.442:1427): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:26.442000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:26.464000 audit[5046]: USER_START pid=5046 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.561259 kernel: audit: type=1105 audit(1707508526.464:1428): pid=5046 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.467000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.594127 kernel: audit: type=1103 audit(1707508526.467:1429): pid=5048 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.782435 sshd[5046]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:26.783000 audit[5046]: USER_END pid=5046 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.788379 systemd-logind[1141]: Session 16 logged out. Waiting for processes to exit. Feb 9 19:55:26.791090 systemd[1]: sshd@15-10.128.0.37:22-147.75.109.163:50998.service: Deactivated successfully. Feb 9 19:55:26.792281 systemd[1]: session-16.scope: Deactivated successfully. Feb 9 19:55:26.795326 systemd-logind[1141]: Removed session 16. Feb 9 19:55:26.783000 audit[5046]: CRED_DISP pid=5046 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.842106 kernel: audit: type=1106 audit(1707508526.783:1430): pid=5046 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.842284 kernel: audit: type=1104 audit(1707508526.783:1431): pid=5046 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:26.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.37:22-147.75.109.163:50998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:26.846169 systemd[1]: Started sshd@16-10.128.0.37:22-147.75.109.163:51012.service. Feb 9 19:55:26.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.37:22-147.75.109.163:51012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:27.141000 audit[5058]: USER_ACCT pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:27.144269 sshd[5058]: Accepted publickey for core from 147.75.109.163 port 51012 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:27.144000 audit[5058]: CRED_ACQ pid=5058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:27.144000 audit[5058]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe573fd7d0 a2=3 a3=0 items=0 ppid=1 pid=5058 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:27.144000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:27.145966 sshd[5058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:27.153958 systemd[1]: Started session-17.scope. Feb 9 19:55:27.155316 systemd-logind[1141]: New session 17 of user core. Feb 9 19:55:27.167000 audit[5058]: USER_START pid=5058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:27.170000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:28.529016 sshd[5058]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:28.530000 audit[5058]: USER_END pid=5058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:28.530000 audit[5058]: CRED_DISP pid=5058 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:28.534262 systemd[1]: sshd@16-10.128.0.37:22-147.75.109.163:51012.service: Deactivated successfully. Feb 9 19:55:28.535520 systemd[1]: session-17.scope: Deactivated successfully. Feb 9 19:55:28.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.37:22-147.75.109.163:51012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:28.535712 systemd-logind[1141]: Session 17 logged out. Waiting for processes to exit. Feb 9 19:55:28.537733 systemd-logind[1141]: Removed session 17. Feb 9 19:55:28.576649 systemd[1]: Started sshd@17-10.128.0.37:22-147.75.109.163:51018.service. Feb 9 19:55:28.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.37:22-147.75.109.163:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:28.860000 audit[5068]: USER_ACCT pid=5068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:28.862910 sshd[5068]: Accepted publickey for core from 147.75.109.163 port 51018 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:28.862000 audit[5068]: CRED_ACQ pid=5068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:28.862000 audit[5068]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0dc51700 a2=3 a3=0 items=0 ppid=1 pid=5068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:28.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:28.863972 sshd[5068]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:28.871023 systemd[1]: Started session-18.scope. Feb 9 19:55:28.872286 systemd-logind[1141]: New session 18 of user core. Feb 9 19:55:28.879000 audit[5068]: USER_START pid=5068 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:28.881000 audit[5070]: CRED_ACQ pid=5070 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:29.154212 sshd[5068]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:29.155000 audit[5068]: USER_END pid=5068 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:29.155000 audit[5068]: CRED_DISP pid=5068 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:29.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.37:22-147.75.109.163:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:29.160502 systemd-logind[1141]: Session 18 logged out. Waiting for processes to exit. Feb 9 19:55:29.160753 systemd[1]: sshd@17-10.128.0.37:22-147.75.109.163:51018.service: Deactivated successfully. Feb 9 19:55:29.161929 systemd[1]: session-18.scope: Deactivated successfully. Feb 9 19:55:29.163607 systemd-logind[1141]: Removed session 18. Feb 9 19:55:31.640000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.647598 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:55:31.647756 kernel: audit: type=1400 audit(1707508531.640:1451): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.675126 kernel: audit: type=1300 audit(1707508531.640:1451): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dea9a0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.640000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dea9a0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.640000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:31.709121 kernel: audit: type=1327 audit(1707508531.640:1451): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:31.646000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.763795 kernel: audit: type=1400 audit(1707508531.646:1452): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.764023 kernel: audit: type=1300 audit(1707508531.646:1452): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dea9e0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.646000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dea9e0 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:31.799265 kernel: audit: type=1327 audit(1707508531.646:1452): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:31.652000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.853820 kernel: audit: type=1400 audit(1707508531.652:1453): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.854025 kernel: audit: type=1300 audit(1707508531.652:1453): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000deaa20 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.652000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000deaa20 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:31.917408 kernel: audit: type=1327 audit(1707508531.652:1453): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:31.917607 kernel: audit: type=1400 audit(1707508531.657:1454): avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.657000 audit[2012]: AVC avc: denied { watch } for pid=2012 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 9 19:55:31.657000 audit[2012]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000deaa60 a2=fc6 a3=0 items=0 ppid=1859 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c289,c665 key=(null) Feb 9 19:55:31.657000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 9 19:55:34.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.37:22-147.75.109.163:51024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:34.203406 systemd[1]: Started sshd@18-10.128.0.37:22-147.75.109.163:51024.service. Feb 9 19:55:34.490000 audit[5086]: USER_ACCT pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:34.491978 sshd[5086]: Accepted publickey for core from 147.75.109.163 port 51024 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:34.492000 audit[5086]: CRED_ACQ pid=5086 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:34.492000 audit[5086]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6620dfa0 a2=3 a3=0 items=0 ppid=1 pid=5086 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:34.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:34.494056 sshd[5086]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:34.501293 systemd[1]: Started session-19.scope. Feb 9 19:55:34.501904 systemd-logind[1141]: New session 19 of user core. Feb 9 19:55:34.508000 audit[5086]: USER_START pid=5086 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:34.511000 audit[5088]: CRED_ACQ pid=5088 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:34.790546 sshd[5086]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:34.791000 audit[5086]: USER_END pid=5086 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:34.791000 audit[5086]: CRED_DISP pid=5086 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:34.795700 systemd-logind[1141]: Session 19 logged out. Waiting for processes to exit. Feb 9 19:55:34.796186 systemd[1]: sshd@18-10.128.0.37:22-147.75.109.163:51024.service: Deactivated successfully. Feb 9 19:55:34.797432 systemd[1]: session-19.scope: Deactivated successfully. Feb 9 19:55:34.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.37:22-147.75.109.163:51024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:34.798910 systemd-logind[1141]: Removed session 19. Feb 9 19:55:39.836590 systemd[1]: Started sshd@19-10.128.0.37:22-147.75.109.163:33260.service. Feb 9 19:55:39.871812 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 9 19:55:39.872029 kernel: audit: type=1130 audit(1707508539.835:1464): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.37:22-147.75.109.163:33260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:39.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.37:22-147.75.109.163:33260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:40.152185 kernel: audit: type=1101 audit(1707508540.120:1465): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.120000 audit[5120]: USER_ACCT pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.152937 sshd[5120]: Accepted publickey for core from 147.75.109.163 port 33260 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:40.152000 audit[5120]: CRED_ACQ pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.153915 sshd[5120]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:40.162770 systemd[1]: Started session-20.scope. Feb 9 19:55:40.164148 systemd-logind[1141]: New session 20 of user core. Feb 9 19:55:40.180181 kernel: audit: type=1103 audit(1707508540.152:1466): pid=5120 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.180319 kernel: audit: type=1006 audit(1707508540.152:1467): pid=5120 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Feb 9 19:55:40.152000 audit[5120]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd434d970 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:40.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:40.234166 kernel: audit: type=1300 audit(1707508540.152:1467): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd434d970 a2=3 a3=0 items=0 ppid=1 pid=5120 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:40.234317 kernel: audit: type=1327 audit(1707508540.152:1467): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:40.234357 kernel: audit: type=1105 audit(1707508540.173:1468): pid=5120 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.173000 audit[5120]: USER_START pid=5120 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.176000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.267362 kernel: audit: type=1103 audit(1707508540.176:1469): pid=5122 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.437459 sshd[5120]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:40.439000 audit[5120]: USER_END pid=5120 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.445021 systemd-logind[1141]: Session 20 logged out. Waiting for processes to exit. Feb 9 19:55:40.447737 systemd[1]: sshd@19-10.128.0.37:22-147.75.109.163:33260.service: Deactivated successfully. Feb 9 19:55:40.448970 systemd[1]: session-20.scope: Deactivated successfully. Feb 9 19:55:40.451906 systemd-logind[1141]: Removed session 20. Feb 9 19:55:40.474112 kernel: audit: type=1106 audit(1707508540.439:1470): pid=5120 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.439000 audit[5120]: CRED_DISP pid=5120 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:40.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.37:22-147.75.109.163:33260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:40.499124 kernel: audit: type=1104 audit(1707508540.439:1471): pid=5120 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.485871 systemd[1]: Started sshd@20-10.128.0.37:22-147.75.109.163:42274.service. Feb 9 19:55:45.516878 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:55:45.517052 kernel: audit: type=1130 audit(1707508545.485:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.37:22-147.75.109.163:42274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:45.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.37:22-147.75.109.163:42274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:45.776000 audit[5163]: USER_ACCT pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.808167 kernel: audit: type=1101 audit(1707508545.776:1474): pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.808276 sshd[5163]: Accepted publickey for core from 147.75.109.163 port 42274 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:45.808000 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.810175 sshd[5163]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:45.822900 systemd[1]: Started session-21.scope. Feb 9 19:55:45.825674 systemd-logind[1141]: New session 21 of user core. Feb 9 19:55:45.837049 kernel: audit: type=1103 audit(1707508545.808:1475): pid=5163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.808000 audit[5163]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc70dcaa30 a2=3 a3=0 items=0 ppid=1 pid=5163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:45.857253 kernel: audit: type=1006 audit(1707508545.808:1476): pid=5163 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 9 19:55:45.857330 kernel: audit: type=1300 audit(1707508545.808:1476): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc70dcaa30 a2=3 a3=0 items=0 ppid=1 pid=5163 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:45.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:45.894886 kernel: audit: type=1327 audit(1707508545.808:1476): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:45.895136 kernel: audit: type=1105 audit(1707508545.837:1477): pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.837000 audit[5163]: USER_START pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.929281 kernel: audit: type=1103 audit(1707508545.843:1478): pid=5166 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:45.843000 audit[5166]: CRED_ACQ pid=5166 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:46.091796 sshd[5163]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:46.093000 audit[5163]: USER_END pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:46.127108 kernel: audit: type=1106 audit(1707508546.093:1479): pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:46.127302 kernel: audit: type=1104 audit(1707508546.094:1480): pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:46.094000 audit[5163]: CRED_DISP pid=5163 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:46.129161 systemd[1]: sshd@20-10.128.0.37:22-147.75.109.163:42274.service: Deactivated successfully. Feb 9 19:55:46.130399 systemd[1]: session-21.scope: Deactivated successfully. Feb 9 19:55:46.132721 systemd-logind[1141]: Session 21 logged out. Waiting for processes to exit. Feb 9 19:55:46.134341 systemd-logind[1141]: Removed session 21. Feb 9 19:55:46.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.37:22-147.75.109.163:42274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:51.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.37:22-147.75.109.163:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:51.139612 systemd[1]: Started sshd@21-10.128.0.37:22-147.75.109.163:42284.service. Feb 9 19:55:51.145684 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:55:51.145860 kernel: audit: type=1130 audit(1707508551.138:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.37:22-147.75.109.163:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:51.447000 audit[5178]: USER_ACCT pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.450852 sshd[5178]: Accepted publickey for core from 147.75.109.163 port 42284 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:51.479125 kernel: audit: type=1101 audit(1707508551.447:1483): pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.478000 audit[5178]: CRED_ACQ pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.480563 sshd[5178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:51.490372 systemd[1]: Started session-22.scope. Feb 9 19:55:51.491364 systemd-logind[1141]: New session 22 of user core. Feb 9 19:55:51.521984 kernel: audit: type=1103 audit(1707508551.478:1484): pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.522191 kernel: audit: type=1006 audit(1707508551.478:1485): pid=5178 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 9 19:55:51.522255 kernel: audit: type=1300 audit(1707508551.478:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde16fbb30 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:51.478000 audit[5178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde16fbb30 a2=3 a3=0 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:51.552125 kernel: audit: type=1327 audit(1707508551.478:1485): proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:51.478000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:51.501000 audit[5178]: USER_START pid=5178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.593133 kernel: audit: type=1105 audit(1707508551.501:1486): pid=5178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.505000 audit[5180]: CRED_ACQ pid=5180 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.594186 kernel: audit: type=1103 audit(1707508551.505:1487): pid=5180 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.823566 sshd[5178]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:51.825000 audit[5178]: USER_END pid=5178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.829259 systemd[1]: sshd@21-10.128.0.37:22-147.75.109.163:42284.service: Deactivated successfully. Feb 9 19:55:51.830526 systemd[1]: session-22.scope: Deactivated successfully. Feb 9 19:55:51.833497 systemd-logind[1141]: Session 22 logged out. Waiting for processes to exit. Feb 9 19:55:51.835005 systemd-logind[1141]: Removed session 22. Feb 9 19:55:51.864020 kernel: audit: type=1106 audit(1707508551.825:1488): pid=5178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.864264 kernel: audit: type=1104 audit(1707508551.825:1489): pid=5178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.825000 audit[5178]: CRED_DISP pid=5178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:51.895373 systemd[1]: Started sshd@22-10.128.0.37:22-147.75.109.163:42300.service. Feb 9 19:55:51.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.37:22-147.75.109.163:42284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:51.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.37:22-147.75.109.163:42300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:52.191000 audit[5190]: USER_ACCT pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.194706 sshd[5190]: Accepted publickey for core from 147.75.109.163 port 42300 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:52.194000 audit[5190]: CRED_ACQ pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.194000 audit[5190]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd86680cb0 a2=3 a3=0 items=0 ppid=1 pid=5190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:52.194000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:52.195735 sshd[5190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:52.203386 systemd-logind[1141]: New session 23 of user core. Feb 9 19:55:52.204777 systemd[1]: Started session-23.scope. Feb 9 19:55:52.213000 audit[5190]: USER_START pid=5190 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.216000 audit[5192]: CRED_ACQ pid=5192 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.565210 sshd[5190]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:52.565000 audit[5190]: USER_END pid=5190 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.565000 audit[5190]: CRED_DISP pid=5190 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.37:22-147.75.109.163:42300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:52.568993 systemd[1]: sshd@22-10.128.0.37:22-147.75.109.163:42300.service: Deactivated successfully. Feb 9 19:55:52.570100 systemd[1]: session-23.scope: Deactivated successfully. Feb 9 19:55:52.571568 systemd-logind[1141]: Session 23 logged out. Waiting for processes to exit. Feb 9 19:55:52.572866 systemd-logind[1141]: Removed session 23. Feb 9 19:55:52.608475 systemd[1]: Started sshd@23-10.128.0.37:22-147.75.109.163:42302.service. Feb 9 19:55:52.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.37:22-147.75.109.163:42302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:52.891000 audit[5199]: USER_ACCT pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.894186 sshd[5199]: Accepted publickey for core from 147.75.109.163 port 42302 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:52.893000 audit[5199]: CRED_ACQ pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.894000 audit[5199]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce4f03b60 a2=3 a3=0 items=0 ppid=1 pid=5199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:52.894000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:52.895706 sshd[5199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:52.902942 systemd[1]: Started session-24.scope. Feb 9 19:55:52.903240 systemd-logind[1141]: New session 24 of user core. Feb 9 19:55:52.910000 audit[5199]: USER_START pid=5199 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:52.913000 audit[5201]: CRED_ACQ pid=5201 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:54.407514 sshd[5199]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:54.408000 audit[5199]: USER_END pid=5199 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:54.408000 audit[5199]: CRED_DISP pid=5199 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:54.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.37:22-147.75.109.163:42302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:54.412742 systemd[1]: sshd@23-10.128.0.37:22-147.75.109.163:42302.service: Deactivated successfully. Feb 9 19:55:54.414236 systemd[1]: session-24.scope: Deactivated successfully. Feb 9 19:55:54.416014 systemd-logind[1141]: Session 24 logged out. Waiting for processes to exit. Feb 9 19:55:54.418477 systemd-logind[1141]: Removed session 24. Feb 9 19:55:54.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.37:22-147.75.109.163:34554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:54.460287 systemd[1]: Started sshd@24-10.128.0.37:22-147.75.109.163:34554.service. Feb 9 19:55:54.562000 audit[5241]: NETFILTER_CFG table=filter:125 family=2 entries=18 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.562000 audit[5241]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe01a73fc0 a2=0 a3=7ffe01a73fac items=0 ppid=2323 pid=5241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.562000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.568000 audit[5241]: NETFILTER_CFG table=nat:126 family=2 entries=78 op=nft_register_rule pid=5241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.568000 audit[5241]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe01a73fc0 a2=0 a3=7ffe01a73fac items=0 ppid=2323 pid=5241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.568000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.681000 audit[5267]: NETFILTER_CFG table=filter:127 family=2 entries=30 op=nft_register_rule pid=5267 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.681000 audit[5267]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffdcb339a50 a2=0 a3=7ffdcb339a3c items=0 ppid=2323 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.684000 audit[5267]: NETFILTER_CFG table=nat:128 family=2 entries=78 op=nft_register_rule pid=5267 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.684000 audit[5267]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffdcb339a50 a2=0 a3=7ffdcb339a3c items=0 ppid=2323 pid=5267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.755000 audit[5221]: USER_ACCT pid=5221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:54.758027 sshd[5221]: Accepted publickey for core from 147.75.109.163 port 34554 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:54.757000 audit[5221]: CRED_ACQ pid=5221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:54.757000 audit[5221]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8d3810f0 a2=3 a3=0 items=0 ppid=1 pid=5221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.757000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:54.759229 sshd[5221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:54.768290 systemd[1]: Started session-25.scope. Feb 9 19:55:54.769130 systemd-logind[1141]: New session 25 of user core. Feb 9 19:55:54.782000 audit[5221]: USER_START pid=5221 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:54.785000 audit[5268]: CRED_ACQ pid=5268 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:55.444000 audit[5221]: USER_END pid=5221 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:55.444000 audit[5221]: CRED_DISP pid=5221 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:55.443578 sshd[5221]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:55.448260 systemd-logind[1141]: Session 25 logged out. Waiting for processes to exit. Feb 9 19:55:55.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.37:22-147.75.109.163:34554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:55.451123 systemd[1]: sshd@24-10.128.0.37:22-147.75.109.163:34554.service: Deactivated successfully. Feb 9 19:55:55.452361 systemd[1]: session-25.scope: Deactivated successfully. Feb 9 19:55:55.455307 systemd-logind[1141]: Removed session 25. Feb 9 19:55:55.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.37:22-147.75.109.163:34566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:55.492431 systemd[1]: Started sshd@25-10.128.0.37:22-147.75.109.163:34566.service. Feb 9 19:55:55.792000 audit[5277]: USER_ACCT pid=5277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:55.795432 sshd[5277]: Accepted publickey for core from 147.75.109.163 port 34566 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:55:55.794000 audit[5277]: CRED_ACQ pid=5277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:55.794000 audit[5277]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea533c630 a2=3 a3=0 items=0 ppid=1 pid=5277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:55.794000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:55:55.796538 sshd[5277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:55:55.806687 systemd[1]: Started session-26.scope. Feb 9 19:55:55.808191 systemd-logind[1141]: New session 26 of user core. Feb 9 19:55:55.817000 audit[5277]: USER_START pid=5277 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:55.819000 audit[5281]: CRED_ACQ pid=5281 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:56.135181 sshd[5277]: pam_unix(sshd:session): session closed for user core Feb 9 19:55:56.136000 audit[5277]: USER_END pid=5277 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:56.136000 audit[5277]: CRED_DISP pid=5277 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:55:56.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.37:22-147.75.109.163:34566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:56.140235 systemd[1]: sshd@25-10.128.0.37:22-147.75.109.163:34566.service: Deactivated successfully. Feb 9 19:55:56.141514 systemd[1]: session-26.scope: Deactivated successfully. Feb 9 19:55:56.144533 systemd-logind[1141]: Session 26 logged out. Waiting for processes to exit. Feb 9 19:55:56.146182 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 9 19:55:56.146297 kernel: audit: type=1131 audit(1707508556.139:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.128.0.37:22-147.75.109.163:34566 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:55:56.147488 systemd-logind[1141]: Removed session 26. Feb 9 19:55:57.068362 systemd[1]: run-containerd-runc-k8s.io-caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75-runc.8aoRFH.mount: Deactivated successfully. Feb 9 19:55:59.289100 kubelet[2111]: I0209 19:55:59.289028 2111 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:55:59.298058 systemd[1]: Created slice kubepods-besteffort-pod432e2259_0292_4f95_bc5c_6c8557215ebf.slice. Feb 9 19:55:59.330530 kubelet[2111]: I0209 19:55:59.330420 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/432e2259-0292-4f95-bc5c-6c8557215ebf-calico-apiserver-certs\") pod \"calico-apiserver-79c6d6dcf6-dlxq7\" (UID: \"432e2259-0292-4f95-bc5c-6c8557215ebf\") " pod="calico-apiserver/calico-apiserver-79c6d6dcf6-dlxq7" Feb 9 19:55:59.330530 kubelet[2111]: I0209 19:55:59.330532 2111 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kq7dn\" (UniqueName: \"kubernetes.io/projected/432e2259-0292-4f95-bc5c-6c8557215ebf-kube-api-access-kq7dn\") pod \"calico-apiserver-79c6d6dcf6-dlxq7\" (UID: \"432e2259-0292-4f95-bc5c-6c8557215ebf\") " pod="calico-apiserver/calico-apiserver-79c6d6dcf6-dlxq7" Feb 9 19:55:59.431753 kubelet[2111]: E0209 19:55:59.431690 2111 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:55:59.432157 kubelet[2111]: E0209 19:55:59.431847 2111 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/432e2259-0292-4f95-bc5c-6c8557215ebf-calico-apiserver-certs podName:432e2259-0292-4f95-bc5c-6c8557215ebf nodeName:}" failed. No retries permitted until 2024-02-09 19:55:59.931802846 +0000 UTC m=+151.431739077 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/432e2259-0292-4f95-bc5c-6c8557215ebf-calico-apiserver-certs") pod "calico-apiserver-79c6d6dcf6-dlxq7" (UID: "432e2259-0292-4f95-bc5c-6c8557215ebf") : secret "calico-apiserver-certs" not found Feb 9 19:55:59.472000 audit[5344]: NETFILTER_CFG table=filter:129 family=2 entries=31 op=nft_register_rule pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.491158 kernel: audit: type=1325 audit(1707508559.472:1531): table=filter:129 family=2 entries=31 op=nft_register_rule pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.472000 audit[5344]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd7e89a230 a2=0 a3=7ffd7e89a21c items=0 ppid=2323 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.528131 kernel: audit: type=1300 audit(1707508559.472:1531): arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd7e89a230 a2=0 a3=7ffd7e89a21c items=0 ppid=2323 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.556174 kernel: audit: type=1327 audit(1707508559.472:1531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.518000 audit[5344]: NETFILTER_CFG table=nat:130 family=2 entries=78 op=nft_register_rule pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.574116 kernel: audit: type=1325 audit(1707508559.518:1532): table=nat:130 family=2 entries=78 op=nft_register_rule pid=5344 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.518000 audit[5344]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd7e89a230 a2=0 a3=7ffd7e89a21c items=0 ppid=2323 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.610315 kernel: audit: type=1300 audit(1707508559.518:1532): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd7e89a230 a2=0 a3=7ffd7e89a21c items=0 ppid=2323 pid=5344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.627127 kernel: audit: type=1327 audit(1707508559.518:1532): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.720000 audit[5371]: NETFILTER_CFG table=filter:131 family=2 entries=32 op=nft_register_rule pid=5371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.720000 audit[5371]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7fff948d5c30 a2=0 a3=7fff948d5c1c items=0 ppid=2323 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.772162 kernel: audit: type=1325 audit(1707508559.720:1533): table=filter:131 family=2 entries=32 op=nft_register_rule pid=5371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.772371 kernel: audit: type=1300 audit(1707508559.720:1533): arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7fff948d5c30 a2=0 a3=7fff948d5c1c items=0 ppid=2323 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.720000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.788132 kernel: audit: type=1327 audit(1707508559.720:1533): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.721000 audit[5371]: NETFILTER_CFG table=nat:132 family=2 entries=78 op=nft_register_rule pid=5371 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.721000 audit[5371]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff948d5c30 a2=0 a3=7fff948d5c1c items=0 ppid=2323 pid=5371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.721000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:00.204357 env[1154]: time="2024-02-09T19:56:00.204287304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c6d6dcf6-dlxq7,Uid:432e2259-0292-4f95-bc5c-6c8557215ebf,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:56:00.402111 systemd-networkd[1034]: cali4c922ea22a4: Link UP Feb 9 19:56:00.410179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:56:00.421969 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4c922ea22a4: link becomes ready Feb 9 19:56:00.420457 systemd-networkd[1034]: cali4c922ea22a4: Gained carrier Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.286 [INFO][5373] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0 calico-apiserver-79c6d6dcf6- calico-apiserver 432e2259-0292-4f95-bc5c-6c8557215ebf 1262 0 2024-02-09 19:55:59 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79c6d6dcf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal calico-apiserver-79c6d6dcf6-dlxq7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali4c922ea22a4 [] []}} ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.286 [INFO][5373] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.332 [INFO][5384] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" HandleID="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.344 [INFO][5384] ipam_plugin.go 268: Auto assigning IP ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" HandleID="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000296b00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", "pod":"calico-apiserver-79c6d6dcf6-dlxq7", "timestamp":"2024-02-09 19:56:00.33204474 +0000 UTC"}, Hostname:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.344 [INFO][5384] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.344 [INFO][5384] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.344 [INFO][5384] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal' Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.347 [INFO][5384] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.355 [INFO][5384] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.365 [INFO][5384] ipam.go 489: Trying affinity for 192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.368 [INFO][5384] ipam.go 155: Attempting to load block cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.371 [INFO][5384] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.61.0/26 host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.372 [INFO][5384] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.61.0/26 handle="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.374 [INFO][5384] ipam.go 1682: Creating new handle: k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545 Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.379 [INFO][5384] ipam.go 1203: Writing block in order to claim IPs block=192.168.61.0/26 handle="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.386 [INFO][5384] ipam.go 1216: Successfully claimed IPs: [192.168.61.5/26] block=192.168.61.0/26 handle="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.387 [INFO][5384] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.61.5/26] handle="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" host="ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal" Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.387 [INFO][5384] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:56:00.442517 env[1154]: 2024-02-09 19:56:00.387 [INFO][5384] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.61.5/26] IPv6=[] ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" HandleID="k8s-pod-network.81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Workload="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.443906 env[1154]: 2024-02-09 19:56:00.389 [INFO][5373] k8s.go 385: Populated endpoint ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0", GenerateName:"calico-apiserver-79c6d6dcf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"432e2259-0292-4f95-bc5c-6c8557215ebf", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c6d6dcf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-79c6d6dcf6-dlxq7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.61.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4c922ea22a4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:56:00.443906 env[1154]: 2024-02-09 19:56:00.389 [INFO][5373] k8s.go 386: Calico CNI using IPs: [192.168.61.5/32] ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.443906 env[1154]: 2024-02-09 19:56:00.389 [INFO][5373] dataplane_linux.go 68: Setting the host side veth name to cali4c922ea22a4 ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.443906 env[1154]: 2024-02-09 19:56:00.422 [INFO][5373] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.443906 env[1154]: 2024-02-09 19:56:00.423 [INFO][5373] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0", GenerateName:"calico-apiserver-79c6d6dcf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"432e2259-0292-4f95-bc5c-6c8557215ebf", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c6d6dcf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-ec4bc63c9e053a0d279a.c.flatcar-212911.internal", ContainerID:"81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545", Pod:"calico-apiserver-79c6d6dcf6-dlxq7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.61.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali4c922ea22a4", MAC:"92:55:66:5c:d0:d4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:56:00.443906 env[1154]: 2024-02-09 19:56:00.440 [INFO][5373] k8s.go 491: Wrote updated endpoint to datastore ContainerID="81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-dlxq7" WorkloadEndpoint="ci--3510--3--2--ec4bc63c9e053a0d279a.c.flatcar--212911.internal-k8s-calico--apiserver--79c6d6dcf6--dlxq7-eth0" Feb 9 19:56:00.484735 env[1154]: time="2024-02-09T19:56:00.484528170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:56:00.485082 env[1154]: time="2024-02-09T19:56:00.485016574Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:56:00.485299 env[1154]: time="2024-02-09T19:56:00.485256474Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:56:00.486212 env[1154]: time="2024-02-09T19:56:00.486137071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545 pid=5411 runtime=io.containerd.runc.v2 Feb 9 19:56:00.562070 systemd[1]: run-containerd-runc-k8s.io-81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545-runc.KyUqjz.mount: Deactivated successfully. Feb 9 19:56:00.572387 systemd[1]: Started cri-containerd-81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545.scope. Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.630000 audit: BPF prog-id=204 op=LOAD Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5411 pid=5424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623439623861623764326638373537393532353364376239383930 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5411 pid=5424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623439623861623764326638373537393532353364376239383930 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit: BPF prog-id=205 op=LOAD Feb 9 19:56:00.631000 audit[5424]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003526f0 items=0 ppid=5411 pid=5424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623439623861623764326638373537393532353364376239383930 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit: BPF prog-id=206 op=LOAD Feb 9 19:56:00.631000 audit[5424]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000352738 items=0 ppid=5411 pid=5424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623439623861623764326638373537393532353364376239383930 Feb 9 19:56:00.631000 audit: BPF prog-id=206 op=UNLOAD Feb 9 19:56:00.631000 audit: BPF prog-id=205 op=UNLOAD Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { perfmon } for pid=5424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit[5424]: AVC avc: denied { bpf } for pid=5424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.631000 audit: BPF prog-id=207 op=LOAD Feb 9 19:56:00.631000 audit[5424]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000352b48 items=0 ppid=5411 pid=5424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623439623861623764326638373537393532353364376239383930 Feb 9 19:56:00.663000 audit[5447]: NETFILTER_CFG table=filter:133 family=2 entries=61 op=nft_register_chain pid=5447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:56:00.663000 audit[5447]: SYSCALL arch=c000003e syscall=46 success=yes exit=30940 a0=3 a1=7fffe7c09520 a2=0 a3=7fffe7c0950c items=0 ppid=4103 pid=5447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.663000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:56:00.686014 env[1154]: time="2024-02-09T19:56:00.685872935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c6d6dcf6-dlxq7,Uid:432e2259-0292-4f95-bc5c-6c8557215ebf,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545\"" Feb 9 19:56:00.691722 kubelet[2111]: E0209 19:56:00.691673 2111 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:56:00.692354 env[1154]: time="2024-02-09T19:56:00.692136315Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:56:01.212516 kernel: kauditd_printk_skb: 63 callbacks suppressed Feb 9 19:56:01.212746 kernel: audit: type=1130 audit(1707508561.181:1554): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.37:22-147.75.109.163:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:01.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.37:22-147.75.109.163:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:01.181974 systemd[1]: Started sshd@26-10.128.0.37:22-147.75.109.163:34574.service. Feb 9 19:56:01.475000 audit[5455]: USER_ACCT pid=5455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.478003 sshd[5455]: Accepted publickey for core from 147.75.109.163 port 34574 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:56:01.511138 kernel: audit: type=1101 audit(1707508561.475:1555): pid=5455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.508736 sshd[5455]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:56:01.507000 audit[5455]: CRED_ACQ pid=5455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.540189 kernel: audit: type=1103 audit(1707508561.507:1556): pid=5455 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.541459 systemd-logind[1141]: New session 27 of user core. Feb 9 19:56:01.542312 systemd[1]: Started session-27.scope. Feb 9 19:56:01.565102 kernel: audit: type=1006 audit(1707508561.507:1557): pid=5455 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 9 19:56:01.507000 audit[5455]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed43d4980 a2=3 a3=0 items=0 ppid=1 pid=5455 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.603390 kernel: audit: type=1300 audit(1707508561.507:1557): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed43d4980 a2=3 a3=0 items=0 ppid=1 pid=5455 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.603568 kernel: audit: type=1327 audit(1707508561.507:1557): proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:01.603613 kernel: audit: type=1105 audit(1707508561.585:1558): pid=5455 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.507000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:01.585000 audit[5455]: USER_START pid=5455 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.590000 audit[5457]: CRED_ACQ pid=5457 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.663149 kernel: audit: type=1103 audit(1707508561.590:1559): pid=5457 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.916804 kernel: audit: type=1325 audit(1707508561.892:1560): table=filter:134 family=2 entries=20 op=nft_register_rule pid=5490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:01.892000 audit[5490]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:01.894445 sshd[5455]: pam_unix(sshd:session): session closed for user core Feb 9 19:56:01.914397 systemd[1]: sshd@26-10.128.0.37:22-147.75.109.163:34574.service: Deactivated successfully. Feb 9 19:56:01.915675 systemd[1]: session-27.scope: Deactivated successfully. Feb 9 19:56:01.916874 systemd-logind[1141]: Session 27 logged out. Waiting for processes to exit. Feb 9 19:56:01.892000 audit[5490]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe83eb4160 a2=0 a3=7ffe83eb414c items=0 ppid=2323 pid=5490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.921995 systemd-logind[1141]: Removed session 27. Feb 9 19:56:01.953126 kernel: audit: type=1300 audit(1707508561.892:1560): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe83eb4160 a2=0 a3=7ffe83eb414c items=0 ppid=2323 pid=5490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:01.895000 audit[5455]: USER_END pid=5455 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.895000 audit[5455]: CRED_DISP pid=5455 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:01.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.128.0.37:22-147.75.109.163:34574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:01.901000 audit[5490]: NETFILTER_CFG table=nat:135 family=2 entries=162 op=nft_register_chain pid=5490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:01.901000 audit[5490]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffe83eb4160 a2=0 a3=7ffe83eb414c items=0 ppid=2323 pid=5490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:02.200182 systemd-networkd[1034]: cali4c922ea22a4: Gained IPv6LL Feb 9 19:56:04.101715 env[1154]: time="2024-02-09T19:56:04.101646284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.104704 env[1154]: time="2024-02-09T19:56:04.104645752Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.107497 env[1154]: time="2024-02-09T19:56:04.107451628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.109924 env[1154]: time="2024-02-09T19:56:04.109876922Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.111027 env[1154]: time="2024-02-09T19:56:04.110972286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:56:04.122876 env[1154]: time="2024-02-09T19:56:04.122824059Z" level=info msg="CreateContainer within sandbox \"81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:56:04.144959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount568887847.mount: Deactivated successfully. Feb 9 19:56:04.148761 env[1154]: time="2024-02-09T19:56:04.148704632Z" level=info msg="CreateContainer within sandbox \"81b49b8ab7d2f875795253d7b98901529f2ae48364221c07d37509bd9ea2b545\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c216b14680fed7c4017af49f69687985d413f6432a6600f52a2870f3baee24cc\"" Feb 9 19:56:04.151461 env[1154]: time="2024-02-09T19:56:04.150017027Z" level=info msg="StartContainer for \"c216b14680fed7c4017af49f69687985d413f6432a6600f52a2870f3baee24cc\"" Feb 9 19:56:04.196187 systemd[1]: run-containerd-runc-k8s.io-c216b14680fed7c4017af49f69687985d413f6432a6600f52a2870f3baee24cc-runc.lhxTna.mount: Deactivated successfully. Feb 9 19:56:04.202256 systemd[1]: Started cri-containerd-c216b14680fed7c4017af49f69687985d413f6432a6600f52a2870f3baee24cc.scope. Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.224000 audit: BPF prog-id=208 op=LOAD Feb 9 19:56:04.226000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.226000 audit[5500]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5411 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313662313436383066656437633430313761663439663639363837 Feb 9 19:56:04.226000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.226000 audit[5500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5411 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313662313436383066656437633430313761663439663639363837 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.227000 audit: BPF prog-id=209 op=LOAD Feb 9 19:56:04.227000 audit[5500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000348090 items=0 ppid=5411 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313662313436383066656437633430313761663439663639363837 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.228000 audit: BPF prog-id=210 op=LOAD Feb 9 19:56:04.228000 audit[5500]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003480d8 items=0 ppid=5411 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313662313436383066656437633430313761663439663639363837 Feb 9 19:56:04.229000 audit: BPF prog-id=210 op=UNLOAD Feb 9 19:56:04.229000 audit: BPF prog-id=209 op=UNLOAD Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { perfmon } for pid=5500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit[5500]: AVC avc: denied { bpf } for pid=5500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.229000 audit: BPF prog-id=211 op=LOAD Feb 9 19:56:04.229000 audit[5500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003484e8 items=0 ppid=5411 pid=5500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313662313436383066656437633430313761663439663639363837 Feb 9 19:56:04.282858 env[1154]: time="2024-02-09T19:56:04.282792281Z" level=info msg="StartContainer for \"c216b14680fed7c4017af49f69687985d413f6432a6600f52a2870f3baee24cc\" returns successfully" Feb 9 19:56:04.674084 kubelet[2111]: I0209 19:56:04.674025 2111 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79c6d6dcf6-dlxq7" podStartSLOduration=-9.223372031180819e+09 pod.CreationTimestamp="2024-02-09 19:55:59 +0000 UTC" firstStartedPulling="2024-02-09 19:56:00.687621568 +0000 UTC m=+152.187557775" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:56:04.670777337 +0000 UTC m=+156.170713566" watchObservedRunningTime="2024-02-09 19:56:04.673956374 +0000 UTC m=+156.173892611" Feb 9 19:56:04.761000 audit[5552]: NETFILTER_CFG table=filter:136 family=2 entries=8 op=nft_register_rule pid=5552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.761000 audit[5552]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fffc4da2840 a2=0 a3=7fffc4da282c items=0 ppid=2323 pid=5552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.772000 audit[5552]: NETFILTER_CFG table=nat:137 family=2 entries=198 op=nft_register_rule pid=5552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.772000 audit[5552]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fffc4da2840 a2=0 a3=7fffc4da282c items=0 ppid=2323 pid=5552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.912000 audit[5578]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=5578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.912000 audit[5578]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcde974a30 a2=0 a3=7ffcde974a1c items=0 ppid=2323 pid=5578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.917000 audit[5578]: NETFILTER_CFG table=nat:139 family=2 entries=198 op=nft_register_rule pid=5578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.917000 audit[5578]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffcde974a30 a2=0 a3=7ffcde974a1c items=0 ppid=2323 pid=5578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.936000 audit[5509]: AVC avc: denied { watch } for pid=5509 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_55_59.2183462881/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c79,c777 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c79,c777 tclass=file permissive=0 Feb 9 19:56:04.936000 audit[5509]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000edc120 a2=fc6 a3=0 items=0 ppid=5411 pid=5509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c79,c777 key=(null) Feb 9 19:56:04.936000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:56:05.594134 systemd[1]: run-containerd-runc-k8s.io-caa15430b48acadbbc4b48aa461aeafc097489d412a865a115d9163af4760c75-runc.aT8Vts.mount: Deactivated successfully. Feb 9 19:56:06.942303 systemd[1]: Started sshd@27-10.128.0.37:22-147.75.109.163:43860.service. Feb 9 19:56:06.960788 kernel: kauditd_printk_skb: 79 callbacks suppressed Feb 9 19:56:06.960934 kernel: audit: type=1130 audit(1707508566.942:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.37:22-147.75.109.163:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:06.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.37:22-147.75.109.163:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:07.228000 audit[5602]: USER_ACCT pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.229724 sshd[5602]: Accepted publickey for core from 147.75.109.163 port 43860 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:56:07.259000 audit[5602]: CRED_ACQ pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.260847 sshd[5602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:56:07.269552 systemd[1]: Started session-28.scope. Feb 9 19:56:07.270991 systemd-logind[1141]: New session 28 of user core. Feb 9 19:56:07.285644 kernel: audit: type=1101 audit(1707508567.228:1589): pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.285818 kernel: audit: type=1103 audit(1707508567.259:1590): pid=5602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.302105 kernel: audit: type=1006 audit(1707508567.259:1591): pid=5602 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 9 19:56:07.259000 audit[5602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfce98170 a2=3 a3=0 items=0 ppid=1 pid=5602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:07.303205 kernel: audit: type=1300 audit(1707508567.259:1591): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfce98170 a2=3 a3=0 items=0 ppid=1 pid=5602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:07.259000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:07.331337 kernel: audit: type=1327 audit(1707508567.259:1591): proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:07.279000 audit[5602]: USER_START pid=5602 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.340245 kernel: audit: type=1105 audit(1707508567.279:1592): pid=5602 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.279000 audit[5604]: CRED_ACQ pid=5604 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.373114 kernel: audit: type=1103 audit(1707508567.279:1593): pid=5604 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.526515 sshd[5602]: pam_unix(sshd:session): session closed for user core Feb 9 19:56:07.528000 audit[5602]: USER_END pid=5602 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.532478 systemd[1]: sshd@27-10.128.0.37:22-147.75.109.163:43860.service: Deactivated successfully. Feb 9 19:56:07.533679 systemd[1]: session-28.scope: Deactivated successfully. Feb 9 19:56:07.535704 systemd-logind[1141]: Session 28 logged out. Waiting for processes to exit. Feb 9 19:56:07.537302 systemd-logind[1141]: Removed session 28. Feb 9 19:56:07.528000 audit[5602]: CRED_DISP pid=5602 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.586563 kernel: audit: type=1106 audit(1707508567.528:1594): pid=5602 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.586749 kernel: audit: type=1104 audit(1707508567.528:1595): pid=5602 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:07.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.128.0.37:22-147.75.109.163:43860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:12.574882 systemd[1]: Started sshd@28-10.128.0.37:22-147.75.109.163:43876.service. Feb 9 19:56:12.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.128.0.37:22-147.75.109.163:43876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:12.581038 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:56:12.581184 kernel: audit: type=1130 audit(1707508572.574:1597): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.128.0.37:22-147.75.109.163:43876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:12.866000 audit[5615]: USER_ACCT pid=5615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:12.898321 kernel: audit: type=1101 audit(1707508572.866:1598): pid=5615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:12.898468 sshd[5615]: Accepted publickey for core from 147.75.109.163 port 43876 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:56:12.898000 audit[5615]: CRED_ACQ pid=5615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:12.900191 sshd[5615]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:56:12.909838 systemd[1]: Started session-29.scope. Feb 9 19:56:12.911898 systemd-logind[1141]: New session 29 of user core. Feb 9 19:56:12.927222 kernel: audit: type=1103 audit(1707508572.898:1599): pid=5615 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:12.927381 kernel: audit: type=1006 audit(1707508572.898:1600): pid=5615 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 9 19:56:12.944992 kernel: audit: type=1300 audit(1707508572.898:1600): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe6c1af80 a2=3 a3=0 items=0 ppid=1 pid=5615 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:12.898000 audit[5615]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe6c1af80 a2=3 a3=0 items=0 ppid=1 pid=5615 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:12.972405 kernel: audit: type=1327 audit(1707508572.898:1600): proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:12.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:12.920000 audit[5615]: USER_START pid=5615 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.014467 kernel: audit: type=1105 audit(1707508572.920:1601): pid=5615 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:12.925000 audit[5617]: CRED_ACQ pid=5617 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.040140 kernel: audit: type=1103 audit(1707508572.925:1602): pid=5617 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.175271 sshd[5615]: pam_unix(sshd:session): session closed for user core Feb 9 19:56:13.177000 audit[5615]: USER_END pid=5615 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.182395 systemd-logind[1141]: Session 29 logged out. Waiting for processes to exit. Feb 9 19:56:13.185090 systemd[1]: sshd@28-10.128.0.37:22-147.75.109.163:43876.service: Deactivated successfully. Feb 9 19:56:13.186330 systemd[1]: session-29.scope: Deactivated successfully. Feb 9 19:56:13.188637 systemd-logind[1141]: Removed session 29. Feb 9 19:56:13.212362 kernel: audit: type=1106 audit(1707508573.177:1603): pid=5615 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.212545 kernel: audit: type=1104 audit(1707508573.178:1604): pid=5615 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.178000 audit[5615]: CRED_DISP pid=5615 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:13.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.128.0.37:22-147.75.109.163:43876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:15.159906 systemd[1]: run-containerd-runc-k8s.io-e893818b7cb258ad117fb1b3490425010c8e5eba1166392e4e1b39e879e3c6f9-runc.excQAW.mount: Deactivated successfully. Feb 9 19:56:18.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.128.0.37:22-147.75.109.163:54148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:18.221378 systemd[1]: Started sshd@29-10.128.0.37:22-147.75.109.163:54148.service. Feb 9 19:56:18.227028 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 9 19:56:18.227299 kernel: audit: type=1130 audit(1707508578.220:1606): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.128.0.37:22-147.75.109.163:54148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:56:18.509000 audit[5654]: USER_ACCT pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.540439 sshd[5654]: Accepted publickey for core from 147.75.109.163 port 54148 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:56:18.541595 kernel: audit: type=1101 audit(1707508578.509:1607): pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.540000 audit[5654]: CRED_ACQ pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.542249 sshd[5654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:56:18.553053 systemd[1]: Started session-30.scope. Feb 9 19:56:18.555491 systemd-logind[1141]: New session 30 of user core. Feb 9 19:56:18.573467 kernel: audit: type=1103 audit(1707508578.540:1608): pid=5654 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.573631 kernel: audit: type=1006 audit(1707508578.540:1609): pid=5654 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 9 19:56:18.540000 audit[5654]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd00c6500 a2=3 a3=0 items=0 ppid=1 pid=5654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:18.614108 kernel: audit: type=1300 audit(1707508578.540:1609): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd00c6500 a2=3 a3=0 items=0 ppid=1 pid=5654 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:18.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:18.623700 kernel: audit: type=1327 audit(1707508578.540:1609): proctitle=737368643A20636F7265205B707269765D Feb 9 19:56:18.623880 kernel: audit: type=1105 audit(1707508578.563:1610): pid=5654 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.563000 audit[5654]: USER_START pid=5654 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.576000 audit[5656]: CRED_ACQ pid=5656 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.681000 kernel: audit: type=1103 audit(1707508578.576:1611): pid=5656 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.821735 sshd[5654]: pam_unix(sshd:session): session closed for user core Feb 9 19:56:18.823000 audit[5654]: USER_END pid=5654 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.828213 systemd-logind[1141]: Session 30 logged out. Waiting for processes to exit. Feb 9 19:56:18.830976 systemd[1]: sshd@29-10.128.0.37:22-147.75.109.163:54148.service: Deactivated successfully. Feb 9 19:56:18.832220 systemd[1]: session-30.scope: Deactivated successfully. Feb 9 19:56:18.835794 systemd-logind[1141]: Removed session 30. Feb 9 19:56:18.823000 audit[5654]: CRED_DISP pid=5654 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.857277 kernel: audit: type=1106 audit(1707508578.823:1612): pid=5654 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.857335 kernel: audit: type=1104 audit(1707508578.823:1613): pid=5654 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:56:18.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.128.0.37:22-147.75.109.163:54148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'