Feb 12 20:33:52.084454 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:33:52.084495 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:33:52.084514 kernel: BIOS-provided physical RAM map: Feb 12 20:33:52.084528 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 12 20:33:52.084541 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 12 20:33:52.084555 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 12 20:33:52.084575 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 12 20:33:52.084589 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 12 20:33:52.084603 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 12 20:33:52.084617 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 12 20:33:52.084631 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 12 20:33:52.084645 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 12 20:33:52.084659 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 12 20:33:52.084674 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 12 20:33:52.084695 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 12 20:33:52.084710 kernel: NX (Execute Disable) protection: active Feb 12 20:33:52.084733 kernel: efi: EFI v2.70 by EDK II Feb 12 20:33:52.084749 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 12 20:33:52.084763 kernel: random: crng init done Feb 12 20:33:52.084777 kernel: SMBIOS 2.4 present. Feb 12 20:33:52.084806 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 12 20:33:52.084821 kernel: Hypervisor detected: KVM Feb 12 20:33:52.084840 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:33:52.084855 kernel: kvm-clock: cpu 0, msr 111faa001, primary cpu clock Feb 12 20:33:52.084870 kernel: kvm-clock: using sched offset of 12433122625 cycles Feb 12 20:33:52.084886 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:33:52.084901 kernel: tsc: Detected 2299.998 MHz processor Feb 12 20:33:52.084917 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:33:52.084933 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:33:52.084948 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 12 20:33:52.084964 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:33:52.084979 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 12 20:33:52.084998 kernel: Using GB pages for direct mapping Feb 12 20:33:52.085012 kernel: Secure boot disabled Feb 12 20:33:52.085028 kernel: ACPI: Early table checksum verification disabled Feb 12 20:33:52.085041 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 12 20:33:52.085056 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 12 20:33:52.085072 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 12 20:33:52.085088 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 12 20:33:52.085103 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 12 20:33:52.085129 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 12 20:33:52.085145 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 12 20:33:52.085162 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 12 20:33:52.085179 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 12 20:33:52.085196 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 12 20:33:52.085213 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 12 20:33:52.085231 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 12 20:33:52.085247 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 12 20:33:52.085264 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 12 20:33:52.085280 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 12 20:33:52.085296 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 12 20:33:52.085313 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 12 20:33:52.085329 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 12 20:33:52.085346 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 12 20:33:52.085363 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 12 20:33:52.085383 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 20:33:52.085399 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 20:33:52.085416 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 20:33:52.085433 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 12 20:33:52.085450 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 12 20:33:52.085467 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 12 20:33:52.085483 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 12 20:33:52.085500 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 12 20:33:52.085517 kernel: Zone ranges: Feb 12 20:33:52.085537 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:33:52.085554 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 20:33:52.085571 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 12 20:33:52.085587 kernel: Movable zone start for each node Feb 12 20:33:52.085604 kernel: Early memory node ranges Feb 12 20:33:52.085620 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 12 20:33:52.085637 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 12 20:33:52.085653 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 12 20:33:52.085670 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 12 20:33:52.085690 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 12 20:33:52.085706 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 12 20:33:52.085730 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:33:52.085746 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 12 20:33:52.085762 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 12 20:33:52.085779 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 12 20:33:52.085810 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 12 20:33:52.085827 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 20:33:52.085844 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:33:52.085864 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:33:52.085881 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:33:52.085898 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:33:52.085915 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:33:52.085931 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:33:52.085948 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:33:52.085964 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 20:33:52.085980 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 12 20:33:52.085996 kernel: Booting paravirtualized kernel on KVM Feb 12 20:33:52.086018 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:33:52.086034 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 20:33:52.086049 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 20:33:52.086066 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 20:33:52.086082 kernel: pcpu-alloc: [0] 0 1 Feb 12 20:33:52.086099 kernel: kvm-guest: PV spinlocks enabled Feb 12 20:33:52.086116 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 20:33:52.086133 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 12 20:33:52.086149 kernel: Policy zone: Normal Feb 12 20:33:52.086172 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:33:52.086189 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:33:52.086205 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 20:33:52.086222 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:33:52.086238 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:33:52.086256 kernel: Memory: 7536516K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 12 20:33:52.086273 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 20:33:52.086289 kernel: Kernel/User page tables isolation: enabled Feb 12 20:33:52.086309 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:33:52.086325 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:33:52.086340 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:33:52.086358 kernel: rcu: RCU event tracing is enabled. Feb 12 20:33:52.086374 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 20:33:52.086390 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:33:52.086406 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:33:52.086423 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:33:52.086440 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 20:33:52.086461 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 20:33:52.086493 kernel: Console: colour dummy device 80x25 Feb 12 20:33:52.086510 kernel: printk: console [ttyS0] enabled Feb 12 20:33:52.086531 kernel: ACPI: Core revision 20210730 Feb 12 20:33:52.086548 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:33:52.086565 kernel: x2apic enabled Feb 12 20:33:52.086583 kernel: Switched APIC routing to physical x2apic. Feb 12 20:33:52.086601 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 12 20:33:52.086618 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 12 20:33:52.086636 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 12 20:33:52.086658 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 12 20:33:52.086675 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 12 20:33:52.086692 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:33:52.086710 kernel: Spectre V2 : Mitigation: IBRS Feb 12 20:33:52.086734 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:33:52.086752 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:33:52.086774 kernel: RETBleed: Mitigation: IBRS Feb 12 20:33:52.086810 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 20:33:52.086828 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 12 20:33:52.086845 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 20:33:52.086863 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 20:33:52.086881 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 20:33:52.086899 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 20:33:52.086915 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 20:33:52.086933 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 20:33:52.086955 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 20:33:52.086971 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 20:33:52.086989 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:33:52.087007 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:33:52.087023 kernel: LSM: Security Framework initializing Feb 12 20:33:52.087041 kernel: SELinux: Initializing. Feb 12 20:33:52.087058 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:33:52.087076 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:33:52.087094 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 12 20:33:52.087115 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 20:33:52.087133 kernel: signal: max sigframe size: 1776 Feb 12 20:33:52.087151 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:33:52.087168 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 20:33:52.087186 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:33:52.087204 kernel: x86: Booting SMP configuration: Feb 12 20:33:52.087221 kernel: .... node #0, CPUs: #1 Feb 12 20:33:52.087238 kernel: kvm-clock: cpu 1, msr 111faa041, secondary cpu clock Feb 12 20:33:52.087255 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 20:33:52.087276 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 20:33:52.087294 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 20:33:52.087311 kernel: smpboot: Max logical packages: 1 Feb 12 20:33:52.087329 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 12 20:33:52.087347 kernel: devtmpfs: initialized Feb 12 20:33:52.087364 kernel: x86/mm: Memory block size: 128MB Feb 12 20:33:52.087382 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 12 20:33:52.087399 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:33:52.087417 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 20:33:52.087438 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:33:52.087455 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:33:52.087473 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:33:52.087491 kernel: audit: type=2000 audit(1707770031.391:1): state=initialized audit_enabled=0 res=1 Feb 12 20:33:52.087508 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:33:52.087525 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:33:52.087543 kernel: cpuidle: using governor menu Feb 12 20:33:52.087560 kernel: ACPI: bus type PCI registered Feb 12 20:33:52.087577 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:33:52.087598 kernel: dca service started, version 1.12.1 Feb 12 20:33:52.087616 kernel: PCI: Using configuration type 1 for base access Feb 12 20:33:52.087633 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:33:52.087651 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:33:52.087668 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:33:52.087686 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:33:52.087703 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:33:52.087727 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:33:52.087745 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:33:52.087765 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:33:52.087783 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:33:52.087840 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:33:52.087856 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 20:33:52.087872 kernel: ACPI: Interpreter enabled Feb 12 20:33:52.087888 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:33:52.087903 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:33:52.087918 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:33:52.087934 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 20:33:52.087954 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:33:52.088160 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:33:52.095041 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 20:33:52.095075 kernel: PCI host bridge to bus 0000:00 Feb 12 20:33:52.095265 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:33:52.095428 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:33:52.095603 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:33:52.095752 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 12 20:33:52.095921 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:33:52.096119 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:33:52.096303 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 12 20:33:52.096476 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:33:52.096641 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 20:33:52.099074 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 12 20:33:52.099272 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 12 20:33:52.099440 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 12 20:33:52.099622 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:33:52.099782 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 12 20:33:52.099967 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 12 20:33:52.100154 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:33:52.100332 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 20:33:52.100495 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 12 20:33:52.100519 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:33:52.100537 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:33:52.100554 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:33:52.100571 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:33:52.100588 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:33:52.100610 kernel: iommu: Default domain type: Translated Feb 12 20:33:52.100628 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:33:52.100645 kernel: vgaarb: loaded Feb 12 20:33:52.100663 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:33:52.100680 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:33:52.100697 kernel: PTP clock support registered Feb 12 20:33:52.100715 kernel: Registered efivars operations Feb 12 20:33:52.100731 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:33:52.100748 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:33:52.100770 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 12 20:33:52.113893 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 12 20:33:52.113922 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 12 20:33:52.113939 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 12 20:33:52.113956 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:33:52.113972 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:33:52.113989 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:33:52.114006 kernel: pnp: PnP ACPI init Feb 12 20:33:52.114022 kernel: pnp: PnP ACPI: found 7 devices Feb 12 20:33:52.114044 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:33:52.114061 kernel: NET: Registered PF_INET protocol family Feb 12 20:33:52.114077 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 20:33:52.114094 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 20:33:52.114110 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:33:52.114126 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:33:52.114143 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 20:33:52.114160 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 20:33:52.114176 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 20:33:52.114208 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 20:33:52.114231 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:33:52.114247 kernel: NET: Registered PF_XDP protocol family Feb 12 20:33:52.114422 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:33:52.114567 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:33:52.114709 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:33:52.114880 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 12 20:33:52.115044 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:33:52.115073 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:33:52.115091 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 20:33:52.115110 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 12 20:33:52.115127 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 20:33:52.115157 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 12 20:33:52.115175 kernel: clocksource: Switched to clocksource tsc Feb 12 20:33:52.115193 kernel: Initialise system trusted keyrings Feb 12 20:33:52.115210 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 20:33:52.115237 kernel: Key type asymmetric registered Feb 12 20:33:52.115254 kernel: Asymmetric key parser 'x509' registered Feb 12 20:33:52.115271 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:33:52.115289 kernel: io scheduler mq-deadline registered Feb 12 20:33:52.115306 kernel: io scheduler kyber registered Feb 12 20:33:52.115323 kernel: io scheduler bfq registered Feb 12 20:33:52.115341 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:33:52.115359 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:33:52.115522 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 12 20:33:52.115549 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 20:33:52.115705 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 12 20:33:52.115727 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:33:52.127586 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 12 20:33:52.127626 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:33:52.127645 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:33:52.127663 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 20:33:52.127680 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 12 20:33:52.127698 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 12 20:33:52.136524 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 12 20:33:52.136564 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:33:52.136583 kernel: i8042: Warning: Keylock active Feb 12 20:33:52.136601 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:33:52.136618 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:33:52.138421 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 20:33:52.138629 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 20:33:52.138815 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T20:33:51 UTC (1707770031) Feb 12 20:33:52.139005 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 20:33:52.139029 kernel: intel_pstate: CPU model not supported Feb 12 20:33:52.139047 kernel: pstore: Registered efi as persistent store backend Feb 12 20:33:52.139064 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:33:52.139080 kernel: Segment Routing with IPv6 Feb 12 20:33:52.139097 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:33:52.139113 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:33:52.139129 kernel: Key type dns_resolver registered Feb 12 20:33:52.139153 kernel: IPI shorthand broadcast: enabled Feb 12 20:33:52.139171 kernel: sched_clock: Marking stable (725005338, 122534534)->(870415298, -22875426) Feb 12 20:33:52.139188 kernel: registered taskstats version 1 Feb 12 20:33:52.139206 kernel: Loading compiled-in X.509 certificates Feb 12 20:33:52.139222 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:33:52.139238 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:33:52.139255 kernel: Key type .fscrypt registered Feb 12 20:33:52.139273 kernel: Key type fscrypt-provisioning registered Feb 12 20:33:52.139290 kernel: pstore: Using crash dump compression: deflate Feb 12 20:33:52.139311 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:33:52.139329 kernel: ima: No architecture policies found Feb 12 20:33:52.139346 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:33:52.139362 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:33:52.139380 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:33:52.139397 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:33:52.139414 kernel: Run /init as init process Feb 12 20:33:52.139432 kernel: with arguments: Feb 12 20:33:52.139453 kernel: /init Feb 12 20:33:52.139470 kernel: with environment: Feb 12 20:33:52.139487 kernel: HOME=/ Feb 12 20:33:52.139503 kernel: TERM=linux Feb 12 20:33:52.139521 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:33:52.139543 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:33:52.139565 systemd[1]: Detected virtualization kvm. Feb 12 20:33:52.139584 systemd[1]: Detected architecture x86-64. Feb 12 20:33:52.139605 systemd[1]: Running in initrd. Feb 12 20:33:52.139623 systemd[1]: No hostname configured, using default hostname. Feb 12 20:33:52.139641 systemd[1]: Hostname set to . Feb 12 20:33:52.139660 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:33:52.139679 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:33:52.139697 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:33:52.139716 systemd[1]: Reached target cryptsetup.target. Feb 12 20:33:52.139734 systemd[1]: Reached target paths.target. Feb 12 20:33:52.139755 systemd[1]: Reached target slices.target. Feb 12 20:33:52.139773 systemd[1]: Reached target swap.target. Feb 12 20:33:52.147816 systemd[1]: Reached target timers.target. Feb 12 20:33:52.147854 systemd[1]: Listening on iscsid.socket. Feb 12 20:33:52.147873 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:33:52.147892 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:33:52.147911 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:33:52.147935 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:33:52.147953 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:33:52.147972 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:33:52.147990 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:33:52.148008 systemd[1]: Reached target sockets.target. Feb 12 20:33:52.148026 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:33:52.148044 systemd[1]: Finished network-cleanup.service. Feb 12 20:33:52.148063 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:33:52.148081 systemd[1]: Starting systemd-journald.service... Feb 12 20:33:52.148102 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:33:52.148121 systemd[1]: Starting systemd-resolved.service... Feb 12 20:33:52.148139 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:33:52.148175 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:33:52.148198 kernel: audit: type=1130 audit(1707770032.102:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.148218 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:33:52.148237 kernel: audit: type=1130 audit(1707770032.108:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.148259 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:33:52.148278 kernel: audit: type=1130 audit(1707770032.118:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.148297 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:33:52.148315 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:33:52.148339 systemd-journald[189]: Journal started Feb 12 20:33:52.148430 systemd-journald[189]: Runtime Journal (/run/log/journal/1bf0aa528ceda51362f902759fdfd2ab) is 8.0M, max 148.8M, 140.8M free. Feb 12 20:33:52.157821 systemd[1]: Started systemd-journald.service. Feb 12 20:33:52.157871 kernel: audit: type=1130 audit(1707770032.147:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.157896 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:33:52.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.109267 systemd-modules-load[190]: Inserted module 'overlay' Feb 12 20:33:52.163460 kernel: Bridge firewalling registered Feb 12 20:33:52.162304 systemd-modules-load[190]: Inserted module 'br_netfilter' Feb 12 20:33:52.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.164547 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:33:52.167961 kernel: audit: type=1130 audit(1707770032.162:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.175107 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:33:52.189920 kernel: audit: type=1130 audit(1707770032.177:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.180134 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:33:52.201808 kernel: SCSI subsystem initialized Feb 12 20:33:52.205779 systemd-resolved[191]: Positive Trust Anchors: Feb 12 20:33:52.206363 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:33:52.206442 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:33:52.222898 dracut-cmdline[206]: dracut-dracut-053 Feb 12 20:33:52.222898 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:33:52.237910 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:33:52.237947 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:33:52.237971 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:33:52.214285 systemd-resolved[191]: Defaulting to hostname 'linux'. Feb 12 20:33:52.215754 systemd[1]: Started systemd-resolved.service. Feb 12 20:33:52.236900 systemd-modules-load[190]: Inserted module 'dm_multipath' Feb 12 20:33:52.254215 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:33:52.264933 kernel: audit: type=1130 audit(1707770032.252:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.264975 kernel: audit: type=1130 audit(1707770032.252:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.254518 systemd[1]: Reached target nss-lookup.target. Feb 12 20:33:52.273988 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:33:52.287056 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:33:52.297928 kernel: audit: type=1130 audit(1707770032.289:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.313821 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:33:52.326817 kernel: iscsi: registered transport (tcp) Feb 12 20:33:52.350830 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:33:52.350910 kernel: QLogic iSCSI HBA Driver Feb 12 20:33:52.394610 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:33:52.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.399482 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:33:52.455842 kernel: raid6: avx2x4 gen() 18358 MB/s Feb 12 20:33:52.472831 kernel: raid6: avx2x4 xor() 6962 MB/s Feb 12 20:33:52.489867 kernel: raid6: avx2x2 gen() 18263 MB/s Feb 12 20:33:52.506832 kernel: raid6: avx2x2 xor() 18519 MB/s Feb 12 20:33:52.523836 kernel: raid6: avx2x1 gen() 14260 MB/s Feb 12 20:33:52.540842 kernel: raid6: avx2x1 xor() 16205 MB/s Feb 12 20:33:52.557834 kernel: raid6: sse2x4 gen() 11080 MB/s Feb 12 20:33:52.574835 kernel: raid6: sse2x4 xor() 6639 MB/s Feb 12 20:33:52.591849 kernel: raid6: sse2x2 gen() 12071 MB/s Feb 12 20:33:52.608833 kernel: raid6: sse2x2 xor() 7435 MB/s Feb 12 20:33:52.625833 kernel: raid6: sse2x1 gen() 10574 MB/s Feb 12 20:33:52.643309 kernel: raid6: sse2x1 xor() 5196 MB/s Feb 12 20:33:52.643348 kernel: raid6: using algorithm avx2x4 gen() 18358 MB/s Feb 12 20:33:52.643370 kernel: raid6: .... xor() 6962 MB/s, rmw enabled Feb 12 20:33:52.644021 kernel: raid6: using avx2x2 recovery algorithm Feb 12 20:33:52.658827 kernel: xor: automatically using best checksumming function avx Feb 12 20:33:52.764826 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:33:52.776681 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:33:52.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.775000 audit: BPF prog-id=7 op=LOAD Feb 12 20:33:52.776000 audit: BPF prog-id=8 op=LOAD Feb 12 20:33:52.778811 systemd[1]: Starting systemd-udevd.service... Feb 12 20:33:52.795051 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 12 20:33:52.802023 systemd[1]: Started systemd-udevd.service. Feb 12 20:33:52.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.807885 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:33:52.827569 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Feb 12 20:33:52.865803 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:33:52.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.867106 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:33:52.930511 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:33:52.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:52.999825 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:33:53.050822 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 20:33:53.050911 kernel: scsi host0: Virtio SCSI HBA Feb 12 20:33:53.054835 kernel: AES CTR mode by8 optimization enabled Feb 12 20:33:53.087818 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 12 20:33:53.142034 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 12 20:33:53.142266 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 12 20:33:53.143291 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 12 20:33:53.143656 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 12 20:33:53.143928 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 12 20:33:53.154396 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:33:53.154453 kernel: GPT:17805311 != 25165823 Feb 12 20:33:53.154476 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:33:53.154497 kernel: GPT:17805311 != 25165823 Feb 12 20:33:53.154937 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:33:53.156400 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:53.158810 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 12 20:33:53.203815 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (447) Feb 12 20:33:53.216852 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:33:53.232653 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:33:53.236895 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:33:53.247891 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:33:53.256707 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:33:53.262205 systemd[1]: Starting disk-uuid.service... Feb 12 20:33:53.273701 disk-uuid[514]: Primary Header is updated. Feb 12 20:33:53.273701 disk-uuid[514]: Secondary Entries is updated. Feb 12 20:33:53.273701 disk-uuid[514]: Secondary Header is updated. Feb 12 20:33:53.287811 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:53.305825 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:53.322841 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:54.316659 disk-uuid[515]: The operation has completed successfully. Feb 12 20:33:54.320961 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:33:54.392254 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:33:54.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.392383 systemd[1]: Finished disk-uuid.service. Feb 12 20:33:54.410844 systemd[1]: Starting verity-setup.service... Feb 12 20:33:54.438959 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 20:33:54.512714 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:33:54.515235 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:33:54.527426 systemd[1]: Finished verity-setup.service. Feb 12 20:33:54.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.614846 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:33:54.615154 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:33:54.622186 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:33:54.658884 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:33:54.658933 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:33:54.658960 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:33:54.623164 systemd[1]: Starting ignition-setup.service... Feb 12 20:33:54.678075 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:33:54.672019 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:33:54.689750 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:33:54.704110 systemd[1]: Finished ignition-setup.service. Feb 12 20:33:54.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.706053 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:33:54.792053 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:33:54.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.791000 audit: BPF prog-id=9 op=LOAD Feb 12 20:33:54.794076 systemd[1]: Starting systemd-networkd.service... Feb 12 20:33:54.828979 systemd-networkd[689]: lo: Link UP Feb 12 20:33:54.828993 systemd-networkd[689]: lo: Gained carrier Feb 12 20:33:54.830130 systemd-networkd[689]: Enumeration completed Feb 12 20:33:54.830733 systemd[1]: Started systemd-networkd.service. Feb 12 20:33:54.830813 systemd-networkd[689]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:33:54.833050 systemd-networkd[689]: eth0: Link UP Feb 12 20:33:54.833057 systemd-networkd[689]: eth0: Gained carrier Feb 12 20:33:54.841910 systemd-networkd[689]: eth0: DHCPv4 address 10.128.0.24/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 12 20:33:54.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.904076 systemd[1]: Reached target network.target. Feb 12 20:33:54.918002 systemd[1]: Starting iscsiuio.service... Feb 12 20:33:54.927187 systemd[1]: Started iscsiuio.service. Feb 12 20:33:54.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.948122 systemd[1]: Starting iscsid.service... Feb 12 20:33:54.962396 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:33:54.962396 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 20:33:54.962396 iscsid[698]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:33:54.962396 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:33:54.962396 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:33:54.962396 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:33:54.962396 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:33:54.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.955314 systemd[1]: Started iscsid.service. Feb 12 20:33:54.989649 ignition[600]: Ignition 2.14.0 Feb 12 20:33:54.970234 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:33:54.989660 ignition[600]: Stage: fetch-offline Feb 12 20:33:55.042354 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:33:54.989728 ignition[600]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:55.052330 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:33:55.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:54.989778 ignition[600]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:55.070287 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:33:55.010535 ignition[600]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:55.096023 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:33:55.010742 ignition[600]: parsed url from cmdline: "" Feb 12 20:33:55.111048 systemd[1]: Reached target remote-fs.target. Feb 12 20:33:55.010748 ignition[600]: no config URL provided Feb 12 20:33:55.126058 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:33:55.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.010755 ignition[600]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:33:55.147975 systemd[1]: Starting ignition-fetch.service... Feb 12 20:33:55.010766 ignition[600]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:33:55.164275 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:33:55.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.010775 ignition[600]: failed to fetch config: resource requires networking Feb 12 20:33:55.224305 unknown[713]: fetched base config from "system" Feb 12 20:33:55.011204 ignition[600]: Ignition finished successfully Feb 12 20:33:55.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.224318 unknown[713]: fetched base config from "system" Feb 12 20:33:55.160015 ignition[713]: Ignition 2.14.0 Feb 12 20:33:55.224328 unknown[713]: fetched user config from "gcp" Feb 12 20:33:55.160024 ignition[713]: Stage: fetch Feb 12 20:33:55.228718 systemd[1]: Finished ignition-fetch.service. Feb 12 20:33:55.160152 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:55.241069 systemd[1]: Starting ignition-kargs.service... Feb 12 20:33:55.160182 ignition[713]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:55.265317 systemd[1]: Finished ignition-kargs.service. Feb 12 20:33:55.169277 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:55.280719 systemd[1]: Starting ignition-disks.service... Feb 12 20:33:55.169562 ignition[713]: parsed url from cmdline: "" Feb 12 20:33:55.310308 systemd[1]: Finished ignition-disks.service. Feb 12 20:33:55.169569 ignition[713]: no config URL provided Feb 12 20:33:55.317215 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:33:55.169579 ignition[713]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:33:55.339009 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:33:55.169594 ignition[713]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:33:55.346051 systemd[1]: Reached target local-fs.target. Feb 12 20:33:55.169642 ignition[713]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 12 20:33:55.358035 systemd[1]: Reached target sysinit.target. Feb 12 20:33:55.178065 ignition[713]: GET result: OK Feb 12 20:33:55.370028 systemd[1]: Reached target basic.target. Feb 12 20:33:55.178217 ignition[713]: parsing config with SHA512: 630ca0c3df27890129eb26b31855f57b234cf0fdf3da64e4617e2a41b4d7c7dbe405f28ccd6da70d4abdaf30f36374fba2a0e79f0d857dca78f3bdaec64a9707 Feb 12 20:33:55.382174 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:33:55.227019 ignition[713]: fetch: fetch complete Feb 12 20:33:55.227026 ignition[713]: fetch: fetch passed Feb 12 20:33:55.227078 ignition[713]: Ignition finished successfully Feb 12 20:33:55.254016 ignition[719]: Ignition 2.14.0 Feb 12 20:33:55.254025 ignition[719]: Stage: kargs Feb 12 20:33:55.254144 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:55.254168 ignition[719]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:55.260304 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:55.261858 ignition[719]: kargs: kargs passed Feb 12 20:33:55.261904 ignition[719]: Ignition finished successfully Feb 12 20:33:55.291559 ignition[725]: Ignition 2.14.0 Feb 12 20:33:55.291570 ignition[725]: Stage: disks Feb 12 20:33:55.291692 ignition[725]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:55.291721 ignition[725]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:55.299699 ignition[725]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:55.301498 ignition[725]: disks: disks passed Feb 12 20:33:55.301552 ignition[725]: Ignition finished successfully Feb 12 20:33:55.418398 systemd-fsck[733]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 20:33:55.597783 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:33:55.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.599137 systemd[1]: Mounting sysroot.mount... Feb 12 20:33:55.635953 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:33:55.630120 systemd[1]: Mounted sysroot.mount. Feb 12 20:33:55.643293 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:33:55.662448 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:33:55.666592 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:33:55.666643 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:33:55.666672 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:33:55.760957 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (739) Feb 12 20:33:55.761009 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:33:55.761034 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:33:55.761063 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:33:55.686293 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:33:55.774963 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:33:55.708361 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:33:55.783981 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:33:55.753998 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:33:55.801965 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:33:55.811945 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:33:55.831266 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:33:55.821370 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:33:55.867911 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:33:55.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.869152 systemd[1]: Starting ignition-mount.service... Feb 12 20:33:55.896957 systemd[1]: Starting sysroot-boot.service... Feb 12 20:33:55.905373 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 20:33:55.905615 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 20:33:55.931930 ignition[804]: INFO : Ignition 2.14.0 Feb 12 20:33:55.931930 ignition[804]: INFO : Stage: mount Feb 12 20:33:55.931930 ignition[804]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:55.931930 ignition[804]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:55.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:55.941415 systemd[1]: Finished sysroot-boot.service. Feb 12 20:33:56.005111 ignition[804]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:56.005111 ignition[804]: INFO : mount: mount passed Feb 12 20:33:56.005111 ignition[804]: INFO : Ignition finished successfully Feb 12 20:33:56.077938 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (814) Feb 12 20:33:56.077986 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:33:56.078018 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:33:56.078041 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:33:56.078062 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:33:55.949379 systemd[1]: Finished ignition-mount.service. Feb 12 20:33:55.967132 systemd[1]: Starting ignition-files.service... Feb 12 20:33:56.001868 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:33:56.100990 ignition[833]: INFO : Ignition 2.14.0 Feb 12 20:33:56.100990 ignition[833]: INFO : Stage: files Feb 12 20:33:56.100990 ignition[833]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:33:56.100990 ignition[833]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:33:56.100990 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:33:56.100990 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:33:56.058830 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:33:56.176927 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:33:56.176927 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:33:56.176927 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:33:56.176927 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:33:56.176927 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:33:56.176927 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:33:56.176927 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 20:33:56.114689 unknown[833]: wrote ssh authorized keys file for user: core Feb 12 20:33:56.395004 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:33:56.662768 ignition[833]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 20:33:56.686953 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:33:56.686953 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:33:56.686953 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 20:33:56.745354 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:33:56.751941 systemd-networkd[689]: eth0: Gained IPv6LL Feb 12 20:33:56.858802 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:33:56.885941 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (833) Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1520184856" Feb 12 20:33:56.885981 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1520184856": device or resource busy Feb 12 20:33:56.885981 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1520184856", trying btrfs: device or resource busy Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1520184856" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1520184856" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem1520184856" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem1520184856" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:33:56.885981 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:33:56.889073 systemd[1]: mnt-oem1520184856.mount: Deactivated successfully. Feb 12 20:33:57.104970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 12 20:33:57.216360 ignition[833]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 20:33:57.240972 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:33:57.240972 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:33:57.240972 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 12 20:33:57.293237 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 12 20:33:57.591640 ignition[833]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem34031934" Feb 12 20:33:57.615924 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem34031934": device or resource busy Feb 12 20:33:57.615924 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem34031934", trying btrfs: device or resource busy Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem34031934" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem34031934" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem34031934" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem34031934" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:33:57.615924 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:33:57.606517 systemd[1]: mnt-oem34031934.mount: Deactivated successfully. Feb 12 20:33:57.837945 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 12 20:33:57.856043 ignition[833]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 20:33:57.879993 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:33:57.879993 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:33:57.879993 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:33:57.879993 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 12 20:33:58.403441 ignition[833]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:58.427980 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem498316765" Feb 12 20:33:58.918096 kernel: kauditd_printk_skb: 26 callbacks suppressed Feb 12 20:33:58.918144 kernel: audit: type=1130 audit(1707770038.457:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.918161 kernel: audit: type=1130 audit(1707770038.546:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.918178 kernel: audit: type=1130 audit(1707770038.590:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.918192 kernel: audit: type=1131 audit(1707770038.590:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.918215 kernel: audit: type=1130 audit(1707770038.703:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.918229 kernel: audit: type=1131 audit(1707770038.725:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.918243 kernel: audit: type=1130 audit(1707770038.830:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.422284 systemd[1]: mnt-oem498316765.mount: Deactivated successfully. Feb 12 20:33:58.934098 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem498316765": device or resource busy Feb 12 20:33:58.934098 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem498316765", trying btrfs: device or resource busy Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem498316765" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem498316765" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem498316765" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem498316765" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3532561309" Feb 12 20:33:58.934098 ignition[833]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3532561309": device or resource busy Feb 12 20:33:58.934098 ignition[833]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3532561309", trying btrfs: device or resource busy Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3532561309" Feb 12 20:33:58.934098 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3532561309" Feb 12 20:33:59.261964 kernel: audit: type=1131 audit(1707770038.966:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.447102 systemd[1]: Finished ignition-files.service. Feb 12 20:33:59.277158 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem3532561309" Feb 12 20:33:59.277158 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem3532561309" Feb 12 20:33:59.277158 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(20): [started] processing unit "oem-gce.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 12 20:33:59.277158 ignition[833]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:33:59.682087 kernel: audit: type=1131 audit(1707770039.298:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.682146 kernel: audit: type=1131 audit(1707770039.381:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.469053 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:33:59.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.700202 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:33:59.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.722266 iscsid[698]: iscsid shutting down. Feb 12 20:33:59.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(28): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(28): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(29): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(29): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2a): [started] setting preset to enabled for "prepare-helm.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2a): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2c): [started] setting preset to enabled for "oem-gce.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2c): [finished] setting preset to enabled for "oem-gce.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2d): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: op(2d): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 12 20:33:59.737121 ignition[833]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:33:59.737121 ignition[833]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:33:59.737121 ignition[833]: INFO : files: files passed Feb 12 20:33:59.737121 ignition[833]: INFO : Ignition finished successfully Feb 12 20:33:59.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:59.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:00.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:00.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.505081 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:33:58.506058 systemd[1]: Starting ignition-quench.service... Feb 12 20:34:00.109000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:34:00.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.527348 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:34:00.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.548495 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:34:00.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.548634 systemd[1]: Finished ignition-quench.service. Feb 12 20:33:58.592307 systemd[1]: Reached target ignition-complete.target. Feb 12 20:34:00.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.654140 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:34:00.206053 ignition[871]: INFO : Ignition 2.14.0 Feb 12 20:34:00.206053 ignition[871]: INFO : Stage: umount Feb 12 20:34:00.206053 ignition[871]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:34:00.206053 ignition[871]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:34:00.206053 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:34:00.206053 ignition[871]: INFO : umount: umount passed Feb 12 20:34:00.206053 ignition[871]: INFO : Ignition finished successfully Feb 12 20:34:00.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:00.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:00.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:00.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.695158 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:34:00.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.695272 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:34:00.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:00.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:33:58.726548 systemd[1]: Reached target initrd-fs.target. Feb 12 20:33:58.760122 systemd[1]: Reached target initrd.target. Feb 12 20:33:58.781200 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:33:58.782358 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:33:58.809234 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:34:00.414979 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Feb 12 20:33:58.833351 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:33:58.884138 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:33:58.901124 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:33:58.926229 systemd[1]: Stopped target timers.target. Feb 12 20:33:58.941185 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:33:58.941373 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:33:58.968474 systemd[1]: Stopped target initrd.target. Feb 12 20:33:59.009307 systemd[1]: Stopped target basic.target. Feb 12 20:33:59.053273 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:33:59.067325 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:33:59.110256 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:33:59.128313 systemd[1]: Stopped target remote-fs.target. Feb 12 20:33:59.150298 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:33:59.197245 systemd[1]: Stopped target sysinit.target. Feb 12 20:33:59.218259 systemd[1]: Stopped target local-fs.target. Feb 12 20:33:59.240252 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:33:59.270243 systemd[1]: Stopped target swap.target. Feb 12 20:33:59.284176 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:33:59.284371 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:33:59.300474 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:33:59.341264 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:33:59.341446 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:33:59.383290 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:33:59.383499 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:33:59.426287 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:33:59.426466 systemd[1]: Stopped ignition-files.service. Feb 12 20:33:59.438686 systemd[1]: Stopping ignition-mount.service... Feb 12 20:33:59.475301 systemd[1]: Stopping iscsid.service... Feb 12 20:33:59.488082 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:33:59.488298 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:33:59.506660 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:33:59.529109 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:33:59.529365 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:33:59.551420 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:33:59.551597 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:33:59.573311 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:33:59.574125 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:33:59.574242 systemd[1]: Stopped iscsid.service. Feb 12 20:33:59.587679 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:33:59.587778 systemd[1]: Stopped ignition-mount.service. Feb 12 20:33:59.609750 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:33:59.609909 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:33:59.631700 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:33:59.631908 systemd[1]: Stopped ignition-disks.service. Feb 12 20:33:59.665149 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:33:59.665222 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:33:59.690067 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 20:33:59.690143 systemd[1]: Stopped ignition-fetch.service. Feb 12 20:33:59.708057 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:33:59.708136 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:33:59.730047 systemd[1]: Stopped target paths.target. Feb 12 20:33:59.743952 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:33:59.747891 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:33:59.768954 systemd[1]: Stopped target slices.target. Feb 12 20:33:59.785939 systemd[1]: Stopped target sockets.target. Feb 12 20:33:59.804996 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:33:59.805069 systemd[1]: Closed iscsid.socket. Feb 12 20:33:59.825001 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:33:59.825093 systemd[1]: Stopped ignition-setup.service. Feb 12 20:33:59.847055 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:33:59.847143 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:33:59.868217 systemd[1]: Stopping iscsiuio.service... Feb 12 20:33:59.888467 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:33:59.888590 systemd[1]: Stopped iscsiuio.service. Feb 12 20:33:59.901516 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:33:59.901626 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:33:59.922111 systemd[1]: Stopped target network.target. Feb 12 20:33:59.958019 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:33:59.958101 systemd[1]: Closed iscsiuio.socket. Feb 12 20:33:59.978211 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:33:59.981859 systemd-networkd[689]: eth0: DHCPv6 lease lost Feb 12 20:33:59.999149 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:34:00.021285 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:34:00.021410 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:34:00.036813 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:34:00.036949 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:34:00.057643 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:34:00.057693 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:34:00.079873 systemd[1]: Stopping network-cleanup.service... Feb 12 20:34:00.093901 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:34:00.094094 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:34:00.119132 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:34:00.119204 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:34:00.134171 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:34:00.134231 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:34:00.150195 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:34:00.166558 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:34:00.167263 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:34:00.167410 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:34:00.181656 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:34:00.181759 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:34:00.197956 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:34:00.198016 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:34:00.213967 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:34:00.214061 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:34:00.229073 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:34:00.229141 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:34:00.244015 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:34:00.244085 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:34:00.264050 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:34:00.283099 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:34:00.283172 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:34:00.314657 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:34:00.314811 systemd[1]: Stopped network-cleanup.service. Feb 12 20:34:00.330441 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:34:00.330564 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:34:00.346289 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:34:00.363008 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:34:00.384178 systemd[1]: Switching root. Feb 12 20:34:00.426343 systemd-journald[189]: Journal stopped Feb 12 20:34:05.053749 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:34:05.053929 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:34:05.053956 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:34:05.053978 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:34:05.054005 kernel: SELinux: policy capability open_perms=1 Feb 12 20:34:05.054027 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:34:05.054051 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:34:05.054074 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:34:05.054096 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:34:05.054124 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:34:05.054147 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:34:05.054171 systemd[1]: Successfully loaded SELinux policy in 112.355ms. Feb 12 20:34:05.054349 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.977ms. Feb 12 20:34:05.054383 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:34:05.054407 systemd[1]: Detected virtualization kvm. Feb 12 20:34:05.054431 systemd[1]: Detected architecture x86-64. Feb 12 20:34:05.054462 systemd[1]: Detected first boot. Feb 12 20:34:05.054487 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:34:05.054510 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:34:05.054534 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:34:05.054563 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:34:05.054594 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:34:05.054620 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:34:05.054649 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 12 20:34:05.054674 kernel: audit: type=1334 audit(1707770044.126:88): prog-id=12 op=LOAD Feb 12 20:34:05.054696 kernel: audit: type=1334 audit(1707770044.126:89): prog-id=3 op=UNLOAD Feb 12 20:34:05.054717 kernel: audit: type=1334 audit(1707770044.132:90): prog-id=13 op=LOAD Feb 12 20:34:05.054740 kernel: audit: type=1334 audit(1707770044.139:91): prog-id=14 op=LOAD Feb 12 20:34:05.054767 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:34:05.054808 kernel: audit: type=1334 audit(1707770044.139:92): prog-id=4 op=UNLOAD Feb 12 20:34:05.054831 kernel: audit: type=1334 audit(1707770044.139:93): prog-id=5 op=UNLOAD Feb 12 20:34:05.054856 kernel: audit: type=1131 audit(1707770044.140:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.054879 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:34:05.054902 kernel: audit: type=1334 audit(1707770044.209:95): prog-id=12 op=UNLOAD Feb 12 20:34:05.054925 kernel: audit: type=1130 audit(1707770044.225:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.054948 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:34:05.054978 kernel: audit: type=1131 audit(1707770044.225:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.055002 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:34:05.055026 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:34:05.055049 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 20:34:05.055074 systemd[1]: Created slice system-getty.slice. Feb 12 20:34:05.055098 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:34:05.055123 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:34:05.055150 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:34:05.055174 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:34:05.055202 systemd[1]: Created slice user.slice. Feb 12 20:34:05.055226 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:34:05.055248 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:34:05.055273 systemd[1]: Set up automount boot.automount. Feb 12 20:34:05.055295 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:34:05.055319 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:34:05.055343 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:34:05.055375 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:34:05.055400 systemd[1]: Reached target integritysetup.target. Feb 12 20:34:05.055424 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:34:05.055456 systemd[1]: Reached target remote-fs.target. Feb 12 20:34:05.055480 systemd[1]: Reached target slices.target. Feb 12 20:34:05.055505 systemd[1]: Reached target swap.target. Feb 12 20:34:05.055527 systemd[1]: Reached target torcx.target. Feb 12 20:34:05.055551 systemd[1]: Reached target veritysetup.target. Feb 12 20:34:05.055681 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:34:05.055714 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:34:05.055738 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:34:05.055762 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:34:05.055806 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:34:05.055830 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:34:05.055855 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:34:05.055877 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:34:05.055900 systemd[1]: Mounting media.mount... Feb 12 20:34:05.055923 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:34:05.055947 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:34:05.055975 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:34:05.056000 systemd[1]: Mounting tmp.mount... Feb 12 20:34:05.056027 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:34:05.056051 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:34:05.056075 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:34:05.056097 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:34:05.056120 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:34:05.056144 systemd[1]: Starting modprobe@drm.service... Feb 12 20:34:05.056168 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:34:05.056196 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:34:05.056220 systemd[1]: Starting modprobe@loop.service... Feb 12 20:34:05.056244 kernel: fuse: init (API version 7.34) Feb 12 20:34:05.056267 kernel: loop: module loaded Feb 12 20:34:05.056291 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:34:05.056315 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:34:05.056339 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:34:05.056364 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:34:05.056391 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:34:05.056415 systemd[1]: Stopped systemd-journald.service. Feb 12 20:34:05.056439 systemd[1]: Starting systemd-journald.service... Feb 12 20:34:05.056470 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:34:05.056496 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:34:05.056527 systemd-journald[995]: Journal started Feb 12 20:34:05.056647 systemd-journald[995]: Runtime Journal (/run/log/journal/1bf0aa528ceda51362f902759fdfd2ab) is 8.0M, max 148.8M, 140.8M free. Feb 12 20:34:00.425000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:34:00.730000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:34:00.879000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:34:00.879000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:34:00.879000 audit: BPF prog-id=10 op=LOAD Feb 12 20:34:00.880000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:34:00.880000 audit: BPF prog-id=11 op=LOAD Feb 12 20:34:00.880000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:34:01.040000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:34:01.040000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858dc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:01.040000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:34:01.051000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:34:01.051000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b5 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:01.051000 audit: CWD cwd="/" Feb 12 20:34:01.051000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:01.051000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:01.051000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:34:04.126000 audit: BPF prog-id=12 op=LOAD Feb 12 20:34:04.126000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:34:04.132000 audit: BPF prog-id=13 op=LOAD Feb 12 20:34:04.139000 audit: BPF prog-id=14 op=LOAD Feb 12 20:34:04.139000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:34:04.139000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:34:04.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:04.209000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:34:04.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:04.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:04.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:04.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.008000 audit: BPF prog-id=15 op=LOAD Feb 12 20:34:05.008000 audit: BPF prog-id=16 op=LOAD Feb 12 20:34:05.008000 audit: BPF prog-id=17 op=LOAD Feb 12 20:34:05.008000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:34:05.008000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:34:05.049000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:34:05.049000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff3c969950 a2=4000 a3=7fff3c9699ec items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:05.049000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:34:04.126002 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:34:01.036581 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:34:04.142151 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:34:01.037936 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:34:01.037977 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:34:01.038049 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:34:01.038072 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:34:01.038144 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:34:01.038172 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:34:01.038556 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:34:01.038648 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:34:01.038681 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:34:01.040102 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:34:01.040184 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:34:01.040225 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:34:01.040259 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:34:01.040299 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:34:01.040332 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:01Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:34:03.529857 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:34:03.530153 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:34:03.530293 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:34:03.531288 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:34:03.531382 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:34:03.531460 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-02-12T20:34:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:34:05.066841 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:34:05.081820 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:34:05.095812 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:34:05.101827 systemd[1]: Stopped verity-setup.service. Feb 12 20:34:05.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.120822 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:34:05.129879 systemd[1]: Started systemd-journald.service. Feb 12 20:34:05.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.139397 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:34:05.147121 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:34:05.155084 systemd[1]: Mounted media.mount. Feb 12 20:34:05.162053 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:34:05.170046 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:34:05.180039 systemd[1]: Mounted tmp.mount. Feb 12 20:34:05.187121 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:34:05.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.196242 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:34:05.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.205410 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:34:05.205632 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:34:05.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.215458 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:34:05.215694 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:34:05.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.225460 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:34:05.225693 systemd[1]: Finished modprobe@drm.service. Feb 12 20:34:05.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.234420 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:34:05.234648 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:34:05.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.243334 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:34:05.243533 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:34:05.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.252393 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:34:05.252624 systemd[1]: Finished modprobe@loop.service. Feb 12 20:34:05.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.261488 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:34:05.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.270331 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:34:05.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.279318 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:34:05.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.288276 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:34:05.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.297653 systemd[1]: Reached target network-pre.target. Feb 12 20:34:05.307360 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:34:05.317198 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:34:05.323938 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:34:05.326341 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:34:05.335155 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:34:05.343944 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:34:05.345470 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:34:05.352949 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:34:05.354513 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:34:05.357858 systemd-journald[995]: Time spent on flushing to /var/log/journal/1bf0aa528ceda51362f902759fdfd2ab is 47.897ms for 1178 entries. Feb 12 20:34:05.357858 systemd-journald[995]: System Journal (/var/log/journal/1bf0aa528ceda51362f902759fdfd2ab) is 8.0M, max 584.8M, 576.8M free. Feb 12 20:34:05.442968 systemd-journald[995]: Received client request to flush runtime journal. Feb 12 20:34:05.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.370591 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:34:05.379461 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:34:05.390377 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:34:05.399057 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:34:05.408266 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:34:05.417265 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:34:05.429411 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:34:05.438454 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:34:05.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.447722 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:34:05.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:05.457882 udevadm[1009]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 20:34:06.014547 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:34:06.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.021000 audit: BPF prog-id=18 op=LOAD Feb 12 20:34:06.022000 audit: BPF prog-id=19 op=LOAD Feb 12 20:34:06.022000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:34:06.022000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:34:06.024920 systemd[1]: Starting systemd-udevd.service... Feb 12 20:34:06.047283 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Feb 12 20:34:06.095828 systemd[1]: Started systemd-udevd.service. Feb 12 20:34:06.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.104000 audit: BPF prog-id=20 op=LOAD Feb 12 20:34:06.107393 systemd[1]: Starting systemd-networkd.service... Feb 12 20:34:06.118000 audit: BPF prog-id=21 op=LOAD Feb 12 20:34:06.118000 audit: BPF prog-id=22 op=LOAD Feb 12 20:34:06.118000 audit: BPF prog-id=23 op=LOAD Feb 12 20:34:06.121410 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:34:06.176392 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:34:06.196115 systemd[1]: Started systemd-userdbd.service. Feb 12 20:34:06.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.288109 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:34:06.305916 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:34:06.315825 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 20:34:06.320821 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 20:34:06.333092 systemd-networkd[1026]: lo: Link UP Feb 12 20:34:06.333106 systemd-networkd[1026]: lo: Gained carrier Feb 12 20:34:06.333845 systemd-networkd[1026]: Enumeration completed Feb 12 20:34:06.333999 systemd[1]: Started systemd-networkd.service. Feb 12 20:34:06.335213 systemd-networkd[1026]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:34:06.337386 systemd-networkd[1026]: eth0: Link UP Feb 12 20:34:06.337404 systemd-networkd[1026]: eth0: Gained carrier Feb 12 20:34:06.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.348975 systemd-networkd[1026]: eth0: DHCPv4 address 10.128.0.24/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 12 20:34:06.385896 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1021) Feb 12 20:34:06.353000 audit[1025]: AVC avc: denied { confidentiality } for pid=1025 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:34:06.353000 audit[1025]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d70660aa30 a1=32194 a2=7f6af1f29bc5 a3=5 items=108 ppid=1013 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:06.353000 audit: CWD cwd="/" Feb 12 20:34:06.353000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=1 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=2 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=3 name=(null) inode=13828 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=4 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=5 name=(null) inode=13829 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=6 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=7 name=(null) inode=13830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=8 name=(null) inode=13830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=9 name=(null) inode=13831 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=10 name=(null) inode=13830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=11 name=(null) inode=13832 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=12 name=(null) inode=13830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=13 name=(null) inode=13833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=14 name=(null) inode=13830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=15 name=(null) inode=13834 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=16 name=(null) inode=13830 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=17 name=(null) inode=13835 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=18 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=19 name=(null) inode=13836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=20 name=(null) inode=13836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=21 name=(null) inode=13837 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=22 name=(null) inode=13836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=23 name=(null) inode=13838 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=24 name=(null) inode=13836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=25 name=(null) inode=13839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=26 name=(null) inode=13836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=27 name=(null) inode=13840 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=28 name=(null) inode=13836 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=29 name=(null) inode=13841 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=30 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=31 name=(null) inode=13842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=32 name=(null) inode=13842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=33 name=(null) inode=13843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=34 name=(null) inode=13842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=35 name=(null) inode=13844 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=36 name=(null) inode=13842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=37 name=(null) inode=13845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=38 name=(null) inode=13842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=39 name=(null) inode=13846 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=40 name=(null) inode=13842 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=41 name=(null) inode=13847 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=42 name=(null) inode=13827 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=43 name=(null) inode=13848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=44 name=(null) inode=13848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=45 name=(null) inode=13849 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=46 name=(null) inode=13848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=47 name=(null) inode=13850 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=48 name=(null) inode=13848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=49 name=(null) inode=13851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=50 name=(null) inode=13848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=51 name=(null) inode=13852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=52 name=(null) inode=13848 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=53 name=(null) inode=13853 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=55 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=56 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=57 name=(null) inode=13855 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=58 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=59 name=(null) inode=13856 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=60 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=61 name=(null) inode=13857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=62 name=(null) inode=13857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=63 name=(null) inode=13858 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=64 name=(null) inode=13857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=65 name=(null) inode=13859 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=66 name=(null) inode=13857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=67 name=(null) inode=13860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=68 name=(null) inode=13857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=69 name=(null) inode=13861 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=70 name=(null) inode=13857 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=71 name=(null) inode=13862 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=72 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=73 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=74 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=75 name=(null) inode=13864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=76 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=77 name=(null) inode=13865 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=78 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=79 name=(null) inode=13866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=80 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=81 name=(null) inode=13867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=82 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=83 name=(null) inode=13868 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=84 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=85 name=(null) inode=13869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=86 name=(null) inode=13869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=87 name=(null) inode=13870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=88 name=(null) inode=13869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=89 name=(null) inode=13871 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=90 name=(null) inode=13869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=91 name=(null) inode=13872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=92 name=(null) inode=13869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=93 name=(null) inode=13873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=94 name=(null) inode=13869 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=95 name=(null) inode=13874 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=96 name=(null) inode=13854 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=97 name=(null) inode=13875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=98 name=(null) inode=13875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=99 name=(null) inode=13876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=100 name=(null) inode=13875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=101 name=(null) inode=13877 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=102 name=(null) inode=13875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=103 name=(null) inode=13878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=104 name=(null) inode=13875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=105 name=(null) inode=13879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=106 name=(null) inode=13875 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PATH item=107 name=(null) inode=13880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:34:06.353000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:34:06.471165 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:34:06.488912 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 12 20:34:06.489291 kernel: EDAC MC: Ver: 3.0.0 Feb 12 20:34:06.507825 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 20:34:06.518830 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:34:06.539332 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:34:06.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.549506 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:34:06.580990 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:34:06.615113 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:34:06.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.624184 systemd[1]: Reached target cryptsetup.target. Feb 12 20:34:06.634397 systemd[1]: Starting lvm2-activation.service... Feb 12 20:34:06.639498 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:34:06.668032 systemd[1]: Finished lvm2-activation.service. Feb 12 20:34:06.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.677080 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:34:06.685894 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:34:06.685943 systemd[1]: Reached target local-fs.target. Feb 12 20:34:06.693903 systemd[1]: Reached target machines.target. Feb 12 20:34:06.703384 systemd[1]: Starting ldconfig.service... Feb 12 20:34:06.711920 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:34:06.712011 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:34:06.713583 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:34:06.722368 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:34:06.734581 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:34:06.735044 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:34:06.735141 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:34:06.736723 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:34:06.738082 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) Feb 12 20:34:06.746845 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:34:06.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.768784 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:34:06.777645 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:34:06.788513 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:34:06.806194 systemd-tmpfiles[1057]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:34:06.883858 systemd-fsck[1062]: fsck.fat 4.2 (2021-01-31) Feb 12 20:34:06.883858 systemd-fsck[1062]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 20:34:06.886972 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:34:06.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:06.899090 systemd[1]: Mounting boot.mount... Feb 12 20:34:06.945466 systemd[1]: Mounted boot.mount. Feb 12 20:34:06.971176 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:34:06.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.074303 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:34:07.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.085074 systemd[1]: Starting audit-rules.service... Feb 12 20:34:07.093721 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:34:07.103828 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 12 20:34:07.113808 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:34:07.121000 audit: BPF prog-id=24 op=LOAD Feb 12 20:34:07.124870 systemd[1]: Starting systemd-resolved.service... Feb 12 20:34:07.131000 audit: BPF prog-id=25 op=LOAD Feb 12 20:34:07.134964 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:34:07.143904 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:34:07.151927 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:34:07.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.160625 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:34:07.200000 audit[1082]: SYSTEM_BOOT pid=1082 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.226458 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:34:07.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.236595 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:34:07.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.285164 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 12 20:34:07.285435 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 12 20:34:07.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.313355 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:34:07.785524 systemd-timesyncd[1081]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 12 20:34:07.785782 systemd-timesyncd[1081]: Initial clock synchronization to Mon 2024-02-12 20:34:07.785248 UTC. Feb 12 20:34:07.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:07.793012 systemd[1]: Reached target time-set.target. Feb 12 20:34:07.797750 systemd-resolved[1077]: Positive Trust Anchors: Feb 12 20:34:07.797772 systemd-resolved[1077]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:34:07.797833 systemd-resolved[1077]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:34:07.799000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:34:07.799000 audit[1102]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe88a34e00 a2=420 a3=0 items=0 ppid=1065 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:07.800549 augenrules[1102]: No rules Feb 12 20:34:07.799000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:34:07.801981 systemd[1]: Finished audit-rules.service. Feb 12 20:34:07.835069 systemd-resolved[1077]: Defaulting to hostname 'linux'. Feb 12 20:34:07.838506 systemd[1]: Started systemd-resolved.service. Feb 12 20:34:07.846738 systemd[1]: Reached target network.target. Feb 12 20:34:07.855838 systemd[1]: Reached target nss-lookup.target. Feb 12 20:34:07.893371 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:34:07.974675 systemd-networkd[1026]: eth0: Gained IPv6LL Feb 12 20:34:08.290252 systemd[1]: Finished ldconfig.service. Feb 12 20:34:08.299346 systemd[1]: Starting systemd-update-done.service... Feb 12 20:34:08.308426 systemd[1]: Finished systemd-update-done.service. Feb 12 20:34:08.317893 systemd[1]: Reached target sysinit.target. Feb 12 20:34:08.326743 systemd[1]: Started motdgen.path. Feb 12 20:34:08.333660 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:34:08.343835 systemd[1]: Started logrotate.timer. Feb 12 20:34:08.350810 systemd[1]: Started mdadm.timer. Feb 12 20:34:08.357589 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:34:08.365571 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:34:08.365630 systemd[1]: Reached target paths.target. Feb 12 20:34:08.372609 systemd[1]: Reached target timers.target. Feb 12 20:34:08.380049 systemd[1]: Listening on dbus.socket. Feb 12 20:34:08.388898 systemd[1]: Starting docker.socket... Feb 12 20:34:08.399010 systemd[1]: Listening on sshd.socket. Feb 12 20:34:08.405731 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:34:08.407577 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:34:08.408331 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:34:08.416784 systemd[1]: Listening on docker.socket. Feb 12 20:34:08.424781 systemd[1]: Reached target sockets.target. Feb 12 20:34:08.433597 systemd[1]: Reached target basic.target. Feb 12 20:34:08.440680 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:34:08.440733 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:34:08.442218 systemd[1]: Starting containerd.service... Feb 12 20:34:08.450857 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:34:08.461785 systemd[1]: Starting dbus.service... Feb 12 20:34:08.470974 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:34:08.479156 systemd[1]: Starting extend-filesystems.service... Feb 12 20:34:08.486604 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:34:08.488177 systemd[1]: Starting motdgen.service... Feb 12 20:34:08.497504 systemd[1]: Starting oem-gce.service... Feb 12 20:34:08.501433 jq[1113]: false Feb 12 20:34:08.506511 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:34:08.515220 systemd[1]: Starting prepare-critools.service... Feb 12 20:34:08.524191 systemd[1]: Starting prepare-helm.service... Feb 12 20:34:08.534570 extend-filesystems[1115]: Found sda Feb 12 20:34:08.534620 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda1 Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda2 Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda3 Feb 12 20:34:08.619341 extend-filesystems[1115]: Found usr Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda4 Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda6 Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda7 Feb 12 20:34:08.619341 extend-filesystems[1115]: Found sda9 Feb 12 20:34:08.619341 extend-filesystems[1115]: Checking size of /dev/sda9 Feb 12 20:34:08.691403 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 12 20:34:08.543199 systemd[1]: Starting sshd-keygen.service... Feb 12 20:34:08.691738 extend-filesystems[1115]: Resized partition /dev/sda9 Feb 12 20:34:08.555267 systemd[1]: Starting systemd-logind.service... Feb 12 20:34:08.701176 extend-filesystems[1155]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:34:08.725623 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 12 20:34:08.562626 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:34:08.562738 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 12 20:34:08.563501 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:34:08.726579 jq[1140]: true Feb 12 20:34:08.564631 systemd[1]: Starting update-engine.service... Feb 12 20:34:08.573687 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:34:08.727251 tar[1146]: ./ Feb 12 20:34:08.727251 tar[1146]: ./loopback Feb 12 20:34:08.584624 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:34:08.727304 dbus-daemon[1112]: [system] SELinux support is enabled Feb 12 20:34:08.741807 extend-filesystems[1155]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 12 20:34:08.741807 extend-filesystems[1155]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 12 20:34:08.741807 extend-filesystems[1155]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 12 20:34:08.843671 kernel: loop0: detected capacity change from 0 to 2097152 Feb 12 20:34:08.843739 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:34:08.584915 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:34:08.843944 tar[1147]: crictl Feb 12 20:34:08.732620 dbus-daemon[1112]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1026 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 20:34:08.844588 update_engine[1138]: I0212 20:34:08.774072 1138 main.cc:92] Flatcar Update Engine starting Feb 12 20:34:08.844588 update_engine[1138]: I0212 20:34:08.783418 1138 update_check_scheduler.cc:74] Next update check in 10m49s Feb 12 20:34:08.845448 extend-filesystems[1115]: Resized filesystem in /dev/sda9 Feb 12 20:34:08.853650 tar[1148]: linux-amd64/helm Feb 12 20:34:08.585495 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:34:08.763346 dbus-daemon[1112]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 20:34:08.585742 systemd[1]: Finished motdgen.service. Feb 12 20:34:08.597348 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:34:08.855439 mkfs.ext4[1154]: mke2fs 1.46.5 (30-Dec-2021) Feb 12 20:34:08.855439 mkfs.ext4[1154]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 12 20:34:08.855439 mkfs.ext4[1154]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 12 20:34:08.855439 mkfs.ext4[1154]: Filesystem UUID: 5488429b-0b49-4c80-9f5c-4e89a9ebdbeb Feb 12 20:34:08.855439 mkfs.ext4[1154]: Superblock backups stored on blocks: Feb 12 20:34:08.855439 mkfs.ext4[1154]: 32768, 98304, 163840, 229376 Feb 12 20:34:08.855439 mkfs.ext4[1154]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:34:08.855439 mkfs.ext4[1154]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:34:08.855439 mkfs.ext4[1154]: Creating journal (8192 blocks): done Feb 12 20:34:08.855439 mkfs.ext4[1154]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:34:08.597692 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:34:08.856382 jq[1152]: true Feb 12 20:34:08.727519 systemd[1]: Started dbus.service. Feb 12 20:34:08.738123 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:34:08.738161 systemd[1]: Reached target system-config.target. Feb 12 20:34:08.858061 umount[1158]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 12 20:34:08.751555 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:34:08.751589 systemd[1]: Reached target user-config.target. Feb 12 20:34:08.770988 systemd[1]: Starting systemd-hostnamed.service... Feb 12 20:34:08.784071 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:34:08.784332 systemd[1]: Finished extend-filesystems.service. Feb 12 20:34:08.792923 systemd[1]: Started update-engine.service. Feb 12 20:34:08.860496 bash[1183]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:34:08.805614 systemd[1]: Started locksmithd.service. Feb 12 20:34:08.861509 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:34:08.947045 tar[1146]: ./bandwidth Feb 12 20:34:09.004284 tar[1146]: ./ptp Feb 12 20:34:09.043275 env[1153]: time="2024-02-12T20:34:09.043201851Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:34:09.065781 tar[1146]: ./vlan Feb 12 20:34:09.123804 tar[1146]: ./host-device Feb 12 20:34:09.139719 systemd-logind[1135]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:34:09.139763 systemd-logind[1135]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 20:34:09.139793 systemd-logind[1135]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:34:09.147426 systemd-logind[1135]: New seat seat0. Feb 12 20:34:09.159886 coreos-metadata[1111]: Feb 12 20:34:09.159 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 12 20:34:09.161926 systemd[1]: Started systemd-logind.service. Feb 12 20:34:09.169650 coreos-metadata[1111]: Feb 12 20:34:09.169 INFO Fetch failed with 404: resource not found Feb 12 20:34:09.169867 coreos-metadata[1111]: Feb 12 20:34:09.169 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 12 20:34:09.178283 coreos-metadata[1111]: Feb 12 20:34:09.178 INFO Fetch successful Feb 12 20:34:09.178525 coreos-metadata[1111]: Feb 12 20:34:09.178 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 12 20:34:09.180400 coreos-metadata[1111]: Feb 12 20:34:09.180 INFO Fetch failed with 404: resource not found Feb 12 20:34:09.180653 coreos-metadata[1111]: Feb 12 20:34:09.180 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 12 20:34:09.184537 coreos-metadata[1111]: Feb 12 20:34:09.184 INFO Fetch failed with 404: resource not found Feb 12 20:34:09.184771 coreos-metadata[1111]: Feb 12 20:34:09.184 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 12 20:34:09.184911 tar[1146]: ./tuning Feb 12 20:34:09.187761 coreos-metadata[1111]: Feb 12 20:34:09.187 INFO Fetch successful Feb 12 20:34:09.194750 unknown[1111]: wrote ssh authorized keys file for user: core Feb 12 20:34:09.232925 update-ssh-keys[1191]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:34:09.233555 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 20:34:09.277997 tar[1146]: ./vrf Feb 12 20:34:09.291291 env[1153]: time="2024-02-12T20:34:09.291224265Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:34:09.291454 env[1153]: time="2024-02-12T20:34:09.291434542Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:34:09.300772 env[1153]: time="2024-02-12T20:34:09.300711012Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:34:09.304580 env[1153]: time="2024-02-12T20:34:09.304540188Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:34:09.305058 env[1153]: time="2024-02-12T20:34:09.305026644Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:34:09.319864 env[1153]: time="2024-02-12T20:34:09.319821480Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:34:09.320058 env[1153]: time="2024-02-12T20:34:09.320029712Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:34:09.320269 env[1153]: time="2024-02-12T20:34:09.320243618Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:34:09.320590 env[1153]: time="2024-02-12T20:34:09.320552744Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:34:09.325169 env[1153]: time="2024-02-12T20:34:09.325118602Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:34:09.325614 env[1153]: time="2024-02-12T20:34:09.325579807Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:34:09.325896 env[1153]: time="2024-02-12T20:34:09.325870406Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:34:09.326113 env[1153]: time="2024-02-12T20:34:09.326088535Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:34:09.326589 env[1153]: time="2024-02-12T20:34:09.326566124Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:34:09.334934 env[1153]: time="2024-02-12T20:34:09.334896671Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:34:09.335128 env[1153]: time="2024-02-12T20:34:09.335094348Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:34:09.335259 env[1153]: time="2024-02-12T20:34:09.335239556Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:34:09.335430 env[1153]: time="2024-02-12T20:34:09.335395412Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.335676 env[1153]: time="2024-02-12T20:34:09.335650342Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.335831 env[1153]: time="2024-02-12T20:34:09.335807869Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.335964 env[1153]: time="2024-02-12T20:34:09.335945789Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.336097 env[1153]: time="2024-02-12T20:34:09.336075389Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.336229 env[1153]: time="2024-02-12T20:34:09.336209769Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.336351 env[1153]: time="2024-02-12T20:34:09.336332434Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.336498 env[1153]: time="2024-02-12T20:34:09.336452582Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.336664 env[1153]: time="2024-02-12T20:34:09.336633939Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:34:09.336955 env[1153]: time="2024-02-12T20:34:09.336932048Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:34:09.337245 env[1153]: time="2024-02-12T20:34:09.337204778Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:34:09.337891 env[1153]: time="2024-02-12T20:34:09.337862889Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:34:09.338178 env[1153]: time="2024-02-12T20:34:09.338150574Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.338297 env[1153]: time="2024-02-12T20:34:09.338274296Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:34:09.338569 env[1153]: time="2024-02-12T20:34:09.338546514Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.338815 env[1153]: time="2024-02-12T20:34:09.338790813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.338941 env[1153]: time="2024-02-12T20:34:09.338922511Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.339116 env[1153]: time="2024-02-12T20:34:09.339093435Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.339235 env[1153]: time="2024-02-12T20:34:09.339216421Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.339360 env[1153]: time="2024-02-12T20:34:09.339314284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.339558 env[1153]: time="2024-02-12T20:34:09.339534400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.339679 env[1153]: time="2024-02-12T20:34:09.339658309Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.339881 env[1153]: time="2024-02-12T20:34:09.339857994Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:34:09.340139 env[1153]: time="2024-02-12T20:34:09.340106051Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.343549 env[1153]: time="2024-02-12T20:34:09.343517603Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.343682 env[1153]: time="2024-02-12T20:34:09.343661317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.343781 env[1153]: time="2024-02-12T20:34:09.343759338Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:34:09.343897 env[1153]: time="2024-02-12T20:34:09.343869707Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:34:09.343991 env[1153]: time="2024-02-12T20:34:09.343971622Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:34:09.344094 env[1153]: time="2024-02-12T20:34:09.344073194Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:34:09.344239 env[1153]: time="2024-02-12T20:34:09.344217549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:34:09.344887 env[1153]: time="2024-02-12T20:34:09.344791360Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.345080395Z" level=info msg="Connect containerd service" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.345148132Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346001041Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346167647Z" level=info msg="Start subscribing containerd event" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346218240Z" level=info msg="Start recovering state" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346293666Z" level=info msg="Start event monitor" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346313452Z" level=info msg="Start snapshots syncer" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346327615Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:34:09.348555 env[1153]: time="2024-02-12T20:34:09.346340193Z" level=info msg="Start streaming server" Feb 12 20:34:09.351204 dbus-daemon[1112]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 20:34:09.351412 systemd[1]: Started systemd-hostnamed.service. Feb 12 20:34:09.352327 dbus-daemon[1112]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1174 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 20:34:09.364710 systemd[1]: Starting polkit.service... Feb 12 20:34:09.380336 env[1153]: time="2024-02-12T20:34:09.380281464Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:34:09.380665 env[1153]: time="2024-02-12T20:34:09.380638190Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:34:09.380913 env[1153]: time="2024-02-12T20:34:09.380891057Z" level=info msg="containerd successfully booted in 0.411779s" Feb 12 20:34:09.380988 systemd[1]: Started containerd.service. Feb 12 20:34:09.452137 polkitd[1193]: Started polkitd version 121 Feb 12 20:34:09.476537 polkitd[1193]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 20:34:09.476655 polkitd[1193]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 20:34:09.482339 polkitd[1193]: Finished loading, compiling and executing 2 rules Feb 12 20:34:09.483034 dbus-daemon[1112]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 20:34:09.483269 systemd[1]: Started polkit.service. Feb 12 20:34:09.485343 polkitd[1193]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 20:34:09.487259 tar[1146]: ./sbr Feb 12 20:34:09.517987 systemd-hostnamed[1174]: Hostname set to (transient) Feb 12 20:34:09.520714 systemd-resolved[1077]: System hostname changed to 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal'. Feb 12 20:34:09.599613 tar[1146]: ./tap Feb 12 20:34:09.725283 tar[1146]: ./dhcp Feb 12 20:34:10.082932 tar[1146]: ./static Feb 12 20:34:10.203381 tar[1146]: ./firewall Feb 12 20:34:10.348674 tar[1146]: ./macvlan Feb 12 20:34:10.487600 tar[1146]: ./dummy Feb 12 20:34:10.603977 tar[1146]: ./bridge Feb 12 20:34:10.727622 tar[1146]: ./ipvlan Feb 12 20:34:10.808701 tar[1148]: linux-amd64/LICENSE Feb 12 20:34:10.809413 tar[1148]: linux-amd64/README.md Feb 12 20:34:10.826958 systemd[1]: Finished prepare-helm.service. Feb 12 20:34:10.856234 tar[1146]: ./portmap Feb 12 20:34:10.913032 systemd[1]: Finished prepare-critools.service. Feb 12 20:34:10.937942 tar[1146]: ./host-local Feb 12 20:34:11.009678 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:34:12.018976 sshd_keygen[1139]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:34:12.067334 systemd[1]: Finished sshd-keygen.service. Feb 12 20:34:12.076900 systemd[1]: Starting issuegen.service... Feb 12 20:34:12.092383 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:34:12.092638 systemd[1]: Finished issuegen.service. Feb 12 20:34:12.102974 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:34:12.116424 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:34:12.126666 systemd[1]: Started getty@tty1.service. Feb 12 20:34:12.135667 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:34:12.144908 systemd[1]: Reached target getty.target. Feb 12 20:34:12.155297 locksmithd[1181]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:34:14.383912 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 12 20:34:16.430504 kernel: loop0: detected capacity change from 0 to 2097152 Feb 12 20:34:16.454915 systemd-nspawn[1225]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 12 20:34:16.454915 systemd-nspawn[1225]: Press ^] three times within 1s to kill container. Feb 12 20:34:16.470506 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:34:16.557974 systemd[1]: Started oem-gce.service. Feb 12 20:34:16.565108 systemd[1]: Reached target multi-user.target. Feb 12 20:34:16.575664 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:34:16.588846 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:34:16.589119 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:34:16.599816 systemd[1]: Startup finished in 1.013s (kernel) + 8.796s (initrd) + 15.527s (userspace) = 25.338s. Feb 12 20:34:16.659601 systemd-nspawn[1225]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 12 20:34:16.659601 systemd-nspawn[1225]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 12 20:34:16.659915 systemd-nspawn[1225]: + /usr/bin/google_instance_setup Feb 12 20:34:17.283706 instance-setup[1231]: INFO Running google_set_multiqueue. Feb 12 20:34:17.297043 instance-setup[1231]: INFO Set channels for eth0 to 2. Feb 12 20:34:17.300407 instance-setup[1231]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 12 20:34:17.301884 instance-setup[1231]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 12 20:34:17.302378 instance-setup[1231]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 12 20:34:17.303860 instance-setup[1231]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 12 20:34:17.304294 instance-setup[1231]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 12 20:34:17.305715 instance-setup[1231]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 12 20:34:17.306052 instance-setup[1231]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 12 20:34:17.307634 instance-setup[1231]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 12 20:34:17.318907 instance-setup[1231]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 12 20:34:17.319068 instance-setup[1231]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 12 20:34:17.359905 systemd-nspawn[1225]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 12 20:34:17.687903 startup-script[1262]: INFO Starting startup scripts. Feb 12 20:34:17.700728 startup-script[1262]: INFO No startup scripts found in metadata. Feb 12 20:34:17.700887 startup-script[1262]: INFO Finished running startup scripts. Feb 12 20:34:17.733224 systemd-nspawn[1225]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 12 20:34:17.733224 systemd-nspawn[1225]: + daemon_pids=() Feb 12 20:34:17.733892 systemd-nspawn[1225]: + for d in accounts clock_skew network Feb 12 20:34:17.733892 systemd-nspawn[1225]: + daemon_pids+=($!) Feb 12 20:34:17.733892 systemd-nspawn[1225]: + for d in accounts clock_skew network Feb 12 20:34:17.733892 systemd-nspawn[1225]: + daemon_pids+=($!) Feb 12 20:34:17.734137 systemd-nspawn[1225]: + for d in accounts clock_skew network Feb 12 20:34:17.734223 systemd-nspawn[1225]: + daemon_pids+=($!) Feb 12 20:34:17.734308 systemd-nspawn[1225]: + NOTIFY_SOCKET=/run/systemd/notify Feb 12 20:34:17.734308 systemd-nspawn[1225]: + /usr/bin/systemd-notify --ready Feb 12 20:34:17.734801 systemd-nspawn[1225]: + /usr/bin/google_clock_skew_daemon Feb 12 20:34:17.735153 systemd-nspawn[1225]: + /usr/bin/google_network_daemon Feb 12 20:34:17.735492 systemd-nspawn[1225]: + /usr/bin/google_accounts_daemon Feb 12 20:34:17.782746 systemd-nspawn[1225]: + wait -n 36 37 38 Feb 12 20:34:17.946352 systemd[1]: Created slice system-sshd.slice. Feb 12 20:34:17.951419 systemd[1]: Started sshd@0-10.128.0.24:22-147.75.109.163:54412.service. Feb 12 20:34:18.287055 sshd[1270]: Accepted publickey for core from 147.75.109.163 port 54412 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:18.290356 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:18.308049 systemd[1]: Created slice user-500.slice. Feb 12 20:34:18.309926 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:34:18.319237 systemd-logind[1135]: New session 1 of user core. Feb 12 20:34:18.327086 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:34:18.329454 systemd[1]: Starting user@500.service... Feb 12 20:34:18.348123 (systemd)[1277]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:18.512593 google-networking[1267]: INFO Starting Google Networking daemon. Feb 12 20:34:18.555657 systemd[1277]: Queued start job for default target default.target. Feb 12 20:34:18.556633 systemd[1277]: Reached target paths.target. Feb 12 20:34:18.556665 systemd[1277]: Reached target sockets.target. Feb 12 20:34:18.556687 systemd[1277]: Reached target timers.target. Feb 12 20:34:18.556708 systemd[1277]: Reached target basic.target. Feb 12 20:34:18.556782 systemd[1277]: Reached target default.target. Feb 12 20:34:18.556835 systemd[1277]: Startup finished in 194ms. Feb 12 20:34:18.556878 systemd[1]: Started user@500.service. Feb 12 20:34:18.558537 systemd[1]: Started session-1.scope. Feb 12 20:34:18.595875 groupadd[1287]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 12 20:34:18.600129 groupadd[1287]: group added to /etc/gshadow: name=google-sudoers Feb 12 20:34:18.608028 groupadd[1287]: new group: name=google-sudoers, GID=1000 Feb 12 20:34:18.621825 google-accounts[1265]: INFO Starting Google Accounts daemon. Feb 12 20:34:18.629196 google-clock-skew[1266]: INFO Starting Google Clock Skew daemon. Feb 12 20:34:18.642343 google-clock-skew[1266]: INFO Clock drift token has changed: 0. Feb 12 20:34:18.646801 systemd-nspawn[1225]: hwclock: Cannot access the Hardware Clock via any known method. Feb 12 20:34:18.647099 systemd-nspawn[1225]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 12 20:34:18.647921 google-clock-skew[1266]: WARNING Failed to sync system time with hardware clock. Feb 12 20:34:18.654138 google-accounts[1265]: WARNING OS Login not installed. Feb 12 20:34:18.655095 google-accounts[1265]: INFO Creating a new user account for 0. Feb 12 20:34:18.659951 systemd-nspawn[1225]: useradd: invalid user name '0': use --badname to ignore Feb 12 20:34:18.660709 google-accounts[1265]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 12 20:34:18.781299 systemd[1]: Started sshd@1-10.128.0.24:22-147.75.109.163:54428.service. Feb 12 20:34:19.067870 sshd[1300]: Accepted publickey for core from 147.75.109.163 port 54428 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:19.069749 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:19.075546 systemd-logind[1135]: New session 2 of user core. Feb 12 20:34:19.076551 systemd[1]: Started session-2.scope. Feb 12 20:34:19.284994 sshd[1300]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:19.288845 systemd[1]: sshd@1-10.128.0.24:22-147.75.109.163:54428.service: Deactivated successfully. Feb 12 20:34:19.289879 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:34:19.290718 systemd-logind[1135]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:34:19.291904 systemd-logind[1135]: Removed session 2. Feb 12 20:34:19.331705 systemd[1]: Started sshd@2-10.128.0.24:22-147.75.109.163:54430.service. Feb 12 20:34:19.621324 sshd[1306]: Accepted publickey for core from 147.75.109.163 port 54430 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:19.623357 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:19.629574 systemd-logind[1135]: New session 3 of user core. Feb 12 20:34:19.629964 systemd[1]: Started session-3.scope. Feb 12 20:34:19.828661 sshd[1306]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:19.832727 systemd[1]: sshd@2-10.128.0.24:22-147.75.109.163:54430.service: Deactivated successfully. Feb 12 20:34:19.833735 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:34:19.834547 systemd-logind[1135]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:34:19.835736 systemd-logind[1135]: Removed session 3. Feb 12 20:34:19.874753 systemd[1]: Started sshd@3-10.128.0.24:22-147.75.109.163:54440.service. Feb 12 20:34:20.165308 sshd[1312]: Accepted publickey for core from 147.75.109.163 port 54440 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:20.167355 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:20.173377 systemd-logind[1135]: New session 4 of user core. Feb 12 20:34:20.174091 systemd[1]: Started session-4.scope. Feb 12 20:34:20.379144 sshd[1312]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:20.383192 systemd[1]: sshd@3-10.128.0.24:22-147.75.109.163:54440.service: Deactivated successfully. Feb 12 20:34:20.384214 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:34:20.385115 systemd-logind[1135]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:34:20.386342 systemd-logind[1135]: Removed session 4. Feb 12 20:34:20.424169 systemd[1]: Started sshd@4-10.128.0.24:22-147.75.109.163:54452.service. Feb 12 20:34:20.712040 sshd[1318]: Accepted publickey for core from 147.75.109.163 port 54452 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:20.713797 sshd[1318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:20.720391 systemd[1]: Started session-5.scope. Feb 12 20:34:20.721220 systemd-logind[1135]: New session 5 of user core. Feb 12 20:34:20.905403 sudo[1321]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:34:20.905806 sudo[1321]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:34:20.916723 dbus-daemon[1112]: \xd0\u000d\xe9\xfe%V: received setenforce notice (enforcing=-1816007760) Feb 12 20:34:20.918888 sudo[1321]: pam_unix(sudo:session): session closed for user root Feb 12 20:34:20.963404 sshd[1318]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:20.968629 systemd[1]: sshd@4-10.128.0.24:22-147.75.109.163:54452.service: Deactivated successfully. Feb 12 20:34:20.969862 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:34:20.970835 systemd-logind[1135]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:34:20.972225 systemd-logind[1135]: Removed session 5. Feb 12 20:34:21.008395 systemd[1]: Started sshd@5-10.128.0.24:22-147.75.109.163:54460.service. Feb 12 20:34:21.295826 sshd[1325]: Accepted publickey for core from 147.75.109.163 port 54460 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:21.297752 sshd[1325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:21.304228 systemd[1]: Started session-6.scope. Feb 12 20:34:21.304858 systemd-logind[1135]: New session 6 of user core. Feb 12 20:34:21.471334 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:34:21.471726 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:34:21.476016 sudo[1329]: pam_unix(sudo:session): session closed for user root Feb 12 20:34:21.487868 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:34:21.488232 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:34:21.500413 systemd[1]: Stopping audit-rules.service... Feb 12 20:34:21.501000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:34:21.507691 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 20:34:21.507805 kernel: audit: type=1305 audit(1707770061.501:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:34:21.507848 auditctl[1332]: No rules Feb 12 20:34:21.508707 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:34:21.508960 systemd[1]: Stopped audit-rules.service. Feb 12 20:34:21.501000 audit[1332]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeceea510 a2=420 a3=0 items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:21.524202 systemd[1]: Starting audit-rules.service... Feb 12 20:34:21.501000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:34:21.562720 kernel: audit: type=1300 audit(1707770061.501:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdeceea510 a2=420 a3=0 items=0 ppid=1 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:21.562897 kernel: audit: type=1327 audit(1707770061.501:162): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:34:21.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.585060 kernel: audit: type=1131 audit(1707770061.507:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.597550 augenrules[1349]: No rules Feb 12 20:34:21.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.599928 sudo[1328]: pam_unix(sudo:session): session closed for user root Feb 12 20:34:21.598318 systemd[1]: Finished audit-rules.service. Feb 12 20:34:21.599000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.646046 kernel: audit: type=1130 audit(1707770061.598:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.646202 kernel: audit: type=1106 audit(1707770061.599:165): pid=1328 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.653628 kernel: audit: type=1104 audit(1707770061.599:166): pid=1328 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.599000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.648973 sshd[1325]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:21.655975 systemd[1]: sshd@5-10.128.0.24:22-147.75.109.163:54460.service: Deactivated successfully. Feb 12 20:34:21.657064 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:34:21.658787 systemd-logind[1135]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:34:21.660316 systemd-logind[1135]: Removed session 6. Feb 12 20:34:21.650000 audit[1325]: USER_END pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:21.693667 systemd[1]: Started sshd@6-10.128.0.24:22-147.75.109.163:54476.service. Feb 12 20:34:21.701353 kernel: audit: type=1106 audit(1707770061.650:167): pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:21.650000 audit[1325]: CRED_DISP pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:21.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.24:22-147.75.109.163:54460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.750171 kernel: audit: type=1104 audit(1707770061.650:168): pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:21.750282 kernel: audit: type=1131 audit(1707770061.655:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.24:22-147.75.109.163:54460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.24:22-147.75.109.163:54476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:21.985000 audit[1355]: USER_ACCT pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:21.987719 sshd[1355]: Accepted publickey for core from 147.75.109.163 port 54476 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:34:21.987000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:21.987000 audit[1355]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff429d8c50 a2=3 a3=0 items=0 ppid=1 pid=1355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:21.987000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:34:21.988722 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:34:21.995273 systemd[1]: Started session-7.scope. Feb 12 20:34:21.995892 systemd-logind[1135]: New session 7 of user core. Feb 12 20:34:22.004000 audit[1355]: USER_START pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:22.006000 audit[1357]: CRED_ACQ pid=1357 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:22.162000 audit[1358]: USER_ACCT pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:22.163361 sudo[1358]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:34:22.163000 audit[1358]: CRED_REFR pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:22.163781 sudo[1358]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:34:22.165000 audit[1358]: USER_START pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:22.959300 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:34:22.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:22.967977 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:34:22.968529 systemd[1]: Reached target network-online.target. Feb 12 20:34:22.970602 systemd[1]: Starting docker.service... Feb 12 20:34:23.018928 env[1374]: time="2024-02-12T20:34:23.018840411Z" level=info msg="Starting up" Feb 12 20:34:23.020710 env[1374]: time="2024-02-12T20:34:23.020658387Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:34:23.020710 env[1374]: time="2024-02-12T20:34:23.020683726Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:34:23.020904 env[1374]: time="2024-02-12T20:34:23.020722386Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:34:23.020904 env[1374]: time="2024-02-12T20:34:23.020739299Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:34:23.023145 env[1374]: time="2024-02-12T20:34:23.023093688Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:34:23.023145 env[1374]: time="2024-02-12T20:34:23.023118476Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:34:23.023145 env[1374]: time="2024-02-12T20:34:23.023140637Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:34:23.023376 env[1374]: time="2024-02-12T20:34:23.023156622Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:34:23.030360 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3413117552-merged.mount: Deactivated successfully. Feb 12 20:34:23.065873 env[1374]: time="2024-02-12T20:34:23.065795056Z" level=info msg="Loading containers: start." Feb 12 20:34:23.133000 audit[1404]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.133000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff40c64500 a2=0 a3=7fff40c644ec items=0 ppid=1374 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 20:34:23.136000 audit[1406]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.136000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffeb1994830 a2=0 a3=7ffeb199481c items=0 ppid=1374 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 20:34:23.138000 audit[1408]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.138000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc51612b00 a2=0 a3=7ffc51612aec items=0 ppid=1374 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:34:23.141000 audit[1410]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.141000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe2fdb0c20 a2=0 a3=7ffe2fdb0c0c items=0 ppid=1374 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:34:23.145000 audit[1412]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.145000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe91f4d420 a2=0 a3=7ffe91f4d40c items=0 ppid=1374 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.145000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 20:34:23.163000 audit[1417]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.163000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe41e11dc0 a2=0 a3=7ffe41e11dac items=0 ppid=1374 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 20:34:23.174000 audit[1419]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.174000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd117ecae0 a2=0 a3=7ffd117ecacc items=0 ppid=1374 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 20:34:23.177000 audit[1421]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.177000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff909bcfa0 a2=0 a3=7fff909bcf8c items=0 ppid=1374 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 20:34:23.179000 audit[1423]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.179000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd36c48df0 a2=0 a3=7ffd36c48ddc items=0 ppid=1374 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.179000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:34:23.191000 audit[1427]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.191000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe5117e9f0 a2=0 a3=7ffe5117e9dc items=0 ppid=1374 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:34:23.193000 audit[1428]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.193000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc193ddc30 a2=0 a3=7ffc193ddc1c items=0 ppid=1374 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.193000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:34:23.207505 kernel: Initializing XFRM netlink socket Feb 12 20:34:23.251587 env[1374]: time="2024-02-12T20:34:23.251432766Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 20:34:23.281000 audit[1436]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.281000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff7dee6fb0 a2=0 a3=7fff7dee6f9c items=0 ppid=1374 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.281000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 20:34:23.293000 audit[1439]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.293000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffca9b4bf50 a2=0 a3=7ffca9b4bf3c items=0 ppid=1374 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 20:34:23.298000 audit[1442]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.298000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd6e009a70 a2=0 a3=7ffd6e009a5c items=0 ppid=1374 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.298000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 20:34:23.301000 audit[1444]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.301000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe6f8f3170 a2=0 a3=7ffe6f8f315c items=0 ppid=1374 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.301000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 20:34:23.305000 audit[1446]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.305000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc5cb47830 a2=0 a3=7ffc5cb4781c items=0 ppid=1374 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.305000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 20:34:23.308000 audit[1448]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.308000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe53106d90 a2=0 a3=7ffe53106d7c items=0 ppid=1374 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.308000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 20:34:23.311000 audit[1450]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.311000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff25998920 a2=0 a3=7fff2599890c items=0 ppid=1374 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 20:34:23.322000 audit[1453]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.322000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcb3ebfb30 a2=0 a3=7ffcb3ebfb1c items=0 ppid=1374 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 20:34:23.325000 audit[1455]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.325000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc087c4d70 a2=0 a3=7ffc087c4d5c items=0 ppid=1374 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.325000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:34:23.328000 audit[1457]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.328000 audit[1457]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff9b310e60 a2=0 a3=7fff9b310e4c items=0 ppid=1374 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:34:23.332000 audit[1459]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.332000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeb1028070 a2=0 a3=7ffeb102805c items=0 ppid=1374 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 20:34:23.333564 systemd-networkd[1026]: docker0: Link UP Feb 12 20:34:23.347000 audit[1463]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.347000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe11e91890 a2=0 a3=7ffe11e9187c items=0 ppid=1374 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:34:23.348000 audit[1464]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:23.348000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe809bbc50 a2=0 a3=7ffe809bbc3c items=0 ppid=1374 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:23.348000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:34:23.349859 env[1374]: time="2024-02-12T20:34:23.349804160Z" level=info msg="Loading containers: done." Feb 12 20:34:23.365669 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2886909140-merged.mount: Deactivated successfully. Feb 12 20:34:23.374699 env[1374]: time="2024-02-12T20:34:23.374637551Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 20:34:23.374946 env[1374]: time="2024-02-12T20:34:23.374913923Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 20:34:23.375112 env[1374]: time="2024-02-12T20:34:23.375073897Z" level=info msg="Daemon has completed initialization" Feb 12 20:34:23.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:23.396625 systemd[1]: Started docker.service. Feb 12 20:34:23.407960 env[1374]: time="2024-02-12T20:34:23.407872239Z" level=info msg="API listen on /run/docker.sock" Feb 12 20:34:23.432057 systemd[1]: Reloading. Feb 12 20:34:23.531366 /usr/lib/systemd/system-generators/torcx-generator[1513]: time="2024-02-12T20:34:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:34:23.531416 /usr/lib/systemd/system-generators/torcx-generator[1513]: time="2024-02-12T20:34:23Z" level=info msg="torcx already run" Feb 12 20:34:23.634719 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:34:23.634745 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:34:23.657802 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.765000 audit: BPF prog-id=34 op=LOAD Feb 12 20:34:23.765000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit: BPF prog-id=35 op=LOAD Feb 12 20:34:23.768000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit: BPF prog-id=36 op=LOAD Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.768000 audit: BPF prog-id=37 op=LOAD Feb 12 20:34:23.768000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:34:23.768000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.769000 audit: BPF prog-id=38 op=LOAD Feb 12 20:34:23.769000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:34:23.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit: BPF prog-id=39 op=LOAD Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.771000 audit: BPF prog-id=40 op=LOAD Feb 12 20:34:23.771000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:34:23.771000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.772000 audit: BPF prog-id=41 op=LOAD Feb 12 20:34:23.772000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.774000 audit: BPF prog-id=42 op=LOAD Feb 12 20:34:23.774000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit: BPF prog-id=43 op=LOAD Feb 12 20:34:23.775000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit: BPF prog-id=44 op=LOAD Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.776000 audit: BPF prog-id=45 op=LOAD Feb 12 20:34:23.776000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:34:23.776000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit: BPF prog-id=46 op=LOAD Feb 12 20:34:23.777000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.777000 audit: BPF prog-id=47 op=LOAD Feb 12 20:34:23.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.778000 audit: BPF prog-id=48 op=LOAD Feb 12 20:34:23.778000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:34:23.778000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit: BPF prog-id=49 op=LOAD Feb 12 20:34:23.780000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit: BPF prog-id=50 op=LOAD Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:23.780000 audit: BPF prog-id=51 op=LOAD Feb 12 20:34:23.780000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:34:23.780000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:34:23.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:23.798637 systemd[1]: Started kubelet.service. Feb 12 20:34:23.892221 kubelet[1556]: E0212 20:34:23.891931 1556 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:34:23.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:34:23.895514 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:34:23.895718 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:34:24.428430 env[1153]: time="2024-02-12T20:34:24.428366030Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 20:34:24.893203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount214416069.mount: Deactivated successfully. Feb 12 20:34:26.867292 env[1153]: time="2024-02-12T20:34:26.867203608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:26.870334 env[1153]: time="2024-02-12T20:34:26.870287023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:26.872812 env[1153]: time="2024-02-12T20:34:26.872767244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:26.875236 env[1153]: time="2024-02-12T20:34:26.875193835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:26.876208 env[1153]: time="2024-02-12T20:34:26.876156291Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 12 20:34:26.890887 env[1153]: time="2024-02-12T20:34:26.890834911Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 20:34:28.716294 env[1153]: time="2024-02-12T20:34:28.716233835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:28.718873 env[1153]: time="2024-02-12T20:34:28.718811865Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:28.721573 env[1153]: time="2024-02-12T20:34:28.721536299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:28.724823 env[1153]: time="2024-02-12T20:34:28.724769757Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:28.725420 env[1153]: time="2024-02-12T20:34:28.725366449Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 12 20:34:28.740604 env[1153]: time="2024-02-12T20:34:28.740553962Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 20:34:30.018718 env[1153]: time="2024-02-12T20:34:30.018642691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:30.021601 env[1153]: time="2024-02-12T20:34:30.021553405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:30.024105 env[1153]: time="2024-02-12T20:34:30.024059894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:30.026553 env[1153]: time="2024-02-12T20:34:30.026508116Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:30.027567 env[1153]: time="2024-02-12T20:34:30.027506010Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 12 20:34:30.042633 env[1153]: time="2024-02-12T20:34:30.042584615Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 20:34:31.019453 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2427770931.mount: Deactivated successfully. Feb 12 20:34:31.666623 env[1153]: time="2024-02-12T20:34:31.666547423Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:31.669529 env[1153]: time="2024-02-12T20:34:31.669476221Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:31.671552 env[1153]: time="2024-02-12T20:34:31.671518762Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:31.673923 env[1153]: time="2024-02-12T20:34:31.673878622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:31.674593 env[1153]: time="2024-02-12T20:34:31.674550372Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 20:34:31.688867 env[1153]: time="2024-02-12T20:34:31.688825769Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 20:34:32.075171 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2813418702.mount: Deactivated successfully. Feb 12 20:34:32.083700 env[1153]: time="2024-02-12T20:34:32.083638815Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:32.086359 env[1153]: time="2024-02-12T20:34:32.086316588Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:32.088809 env[1153]: time="2024-02-12T20:34:32.088767291Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:32.091249 env[1153]: time="2024-02-12T20:34:32.091206927Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:32.092044 env[1153]: time="2024-02-12T20:34:32.092001535Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 20:34:32.106997 env[1153]: time="2024-02-12T20:34:32.106938444Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 20:34:32.816482 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3518561453.mount: Deactivated successfully. Feb 12 20:34:34.026665 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 20:34:34.027007 systemd[1]: Stopped kubelet.service. Feb 12 20:34:34.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:34.034329 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 12 20:34:34.034437 kernel: audit: type=1130 audit(1707770074.026:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:34.077703 kernel: audit: type=1131 audit(1707770074.026:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:34.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:34.066200 systemd[1]: Started kubelet.service. Feb 12 20:34:34.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:34.100619 kernel: audit: type=1130 audit(1707770074.066:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:34.182192 kubelet[1602]: E0212 20:34:34.182136 1602 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:34:34.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:34:34.187602 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:34:34.187814 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:34:34.210496 kernel: audit: type=1131 audit(1707770074.187:416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:34:37.397970 env[1153]: time="2024-02-12T20:34:37.397897592Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:37.400995 env[1153]: time="2024-02-12T20:34:37.400935464Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:37.403578 env[1153]: time="2024-02-12T20:34:37.403538383Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:37.405788 env[1153]: time="2024-02-12T20:34:37.405742160Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:37.406859 env[1153]: time="2024-02-12T20:34:37.406800281Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 12 20:34:37.422259 env[1153]: time="2024-02-12T20:34:37.422211004Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 20:34:37.752496 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1895590691.mount: Deactivated successfully. Feb 12 20:34:38.516041 env[1153]: time="2024-02-12T20:34:38.515978395Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:38.519642 env[1153]: time="2024-02-12T20:34:38.519600020Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:38.521366 env[1153]: time="2024-02-12T20:34:38.521324665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:38.523586 env[1153]: time="2024-02-12T20:34:38.523531868Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:38.524363 env[1153]: time="2024-02-12T20:34:38.524321901Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 20:34:39.533622 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 20:34:39.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:39.557500 kernel: audit: type=1131 audit(1707770079.533:417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:39.573000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:34:39.588174 kernel: audit: type=1334 audit(1707770079.573:418): prog-id=45 op=UNLOAD Feb 12 20:34:39.588264 kernel: audit: type=1334 audit(1707770079.573:419): prog-id=44 op=UNLOAD Feb 12 20:34:39.573000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:34:39.595561 kernel: audit: type=1334 audit(1707770079.573:420): prog-id=43 op=UNLOAD Feb 12 20:34:39.573000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:34:41.581963 systemd[1]: Stopped kubelet.service. Feb 12 20:34:41.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:41.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:41.615199 systemd[1]: Reloading. Feb 12 20:34:41.625916 kernel: audit: type=1130 audit(1707770081.582:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:41.626027 kernel: audit: type=1131 audit(1707770081.586:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:41.726280 /usr/lib/systemd/system-generators/torcx-generator[1697]: time="2024-02-12T20:34:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:34:41.729565 /usr/lib/systemd/system-generators/torcx-generator[1697]: time="2024-02-12T20:34:41Z" level=info msg="torcx already run" Feb 12 20:34:41.814854 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:34:41.814889 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:34:41.837999 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.970170 kernel: audit: type=1400 audit(1707770081.928:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.970283 kernel: audit: type=1400 audit(1707770081.928:424): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.970323 kernel: audit: type=1400 audit(1707770081.928:425): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011340 kernel: audit: type=1400 audit(1707770081.928:426): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit: BPF prog-id=52 op=LOAD Feb 12 20:34:41.969000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit: BPF prog-id=53 op=LOAD Feb 12 20:34:41.990000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:41.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.010000 audit: BPF prog-id=54 op=LOAD Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit: BPF prog-id=55 op=LOAD Feb 12 20:34:42.011000 audit: BPF prog-id=36 op=UNLOAD Feb 12 20:34:42.011000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.011000 audit: BPF prog-id=56 op=LOAD Feb 12 20:34:42.011000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit: BPF prog-id=57 op=LOAD Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.013000 audit: BPF prog-id=58 op=LOAD Feb 12 20:34:42.013000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:34:42.013000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.015000 audit: BPF prog-id=59 op=LOAD Feb 12 20:34:42.015000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.017000 audit: BPF prog-id=60 op=LOAD Feb 12 20:34:42.017000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.018000 audit: BPF prog-id=61 op=LOAD Feb 12 20:34:42.018000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit: BPF prog-id=62 op=LOAD Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.019000 audit: BPF prog-id=63 op=LOAD Feb 12 20:34:42.019000 audit: BPF prog-id=47 op=UNLOAD Feb 12 20:34:42.019000 audit: BPF prog-id=48 op=UNLOAD Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit: BPF prog-id=64 op=LOAD Feb 12 20:34:42.021000 audit: BPF prog-id=49 op=UNLOAD Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit: BPF prog-id=65 op=LOAD Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.021000 audit: BPF prog-id=66 op=LOAD Feb 12 20:34:42.021000 audit: BPF prog-id=50 op=UNLOAD Feb 12 20:34:42.022000 audit: BPF prog-id=51 op=UNLOAD Feb 12 20:34:42.045317 systemd[1]: Started kubelet.service. Feb 12 20:34:42.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:42.117512 kubelet[1741]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:34:42.117512 kubelet[1741]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:34:42.117512 kubelet[1741]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:34:42.117512 kubelet[1741]: I0212 20:34:42.111242 1741 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:34:42.575783 kubelet[1741]: I0212 20:34:42.575740 1741 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:34:42.575783 kubelet[1741]: I0212 20:34:42.575780 1741 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:34:42.576157 kubelet[1741]: I0212 20:34:42.576129 1741 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:34:42.583382 kubelet[1741]: E0212 20:34:42.583347 1741 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.24:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.583635 kubelet[1741]: I0212 20:34:42.583613 1741 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:34:42.586890 kubelet[1741]: I0212 20:34:42.586856 1741 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:34:42.587228 kubelet[1741]: I0212 20:34:42.587195 1741 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:34:42.587323 kubelet[1741]: I0212 20:34:42.587294 1741 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:34:42.587323 kubelet[1741]: I0212 20:34:42.587316 1741 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:34:42.587607 kubelet[1741]: I0212 20:34:42.587334 1741 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:34:42.587607 kubelet[1741]: I0212 20:34:42.587447 1741 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:34:42.594119 kubelet[1741]: I0212 20:34:42.594078 1741 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:34:42.594119 kubelet[1741]: I0212 20:34:42.594108 1741 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:34:42.594284 kubelet[1741]: I0212 20:34:42.594133 1741 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:34:42.594284 kubelet[1741]: I0212 20:34:42.594155 1741 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:34:42.595801 kubelet[1741]: W0212 20:34:42.595732 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.595957 kubelet[1741]: E0212 20:34:42.595939 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.596182 kubelet[1741]: I0212 20:34:42.596166 1741 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:34:42.598789 kubelet[1741]: W0212 20:34:42.598736 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.598981 kubelet[1741]: E0212 20:34:42.598954 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.599359 kubelet[1741]: W0212 20:34:42.599340 1741 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:34:42.600067 kubelet[1741]: I0212 20:34:42.600042 1741 server.go:1168] "Started kubelet" Feb 12 20:34:42.601184 kubelet[1741]: E0212 20:34:42.601047 1741 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal.17b337d78b69d578", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", UID:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 34, 42, 600015224, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 34, 42, 600015224, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.24:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.24:6443: connect: connection refused'(may retry after sleeping) Feb 12 20:34:42.602383 kubelet[1741]: E0212 20:34:42.602359 1741 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:34:42.602517 kubelet[1741]: E0212 20:34:42.602392 1741 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:34:42.602517 kubelet[1741]: I0212 20:34:42.602499 1741 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:34:42.603115 kubelet[1741]: I0212 20:34:42.602923 1741 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:34:42.602000 audit[1741]: AVC avc: denied { mac_admin } for pid=1741 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.602000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:42.604105 kubelet[1741]: I0212 20:34:42.603840 1741 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:34:42.602000 audit[1741]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e1d410 a1=c0006efc68 a2=c000e1d3e0 a3=25 items=0 ppid=1 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.602000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:42.604529 kubelet[1741]: I0212 20:34:42.604510 1741 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:34:42.603000 audit[1741]: AVC avc: denied { mac_admin } for pid=1741 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.603000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:42.603000 audit[1741]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000469120 a1=c0006efc80 a2=c000e1d4a0 a3=25 items=0 ppid=1 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.603000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:42.605047 kubelet[1741]: I0212 20:34:42.605031 1741 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:34:42.605216 kubelet[1741]: I0212 20:34:42.605202 1741 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:34:42.608615 kubelet[1741]: I0212 20:34:42.607984 1741 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:34:42.608615 kubelet[1741]: I0212 20:34:42.608415 1741 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:34:42.608859 kubelet[1741]: W0212 20:34:42.608807 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.608939 kubelet[1741]: E0212 20:34:42.608872 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.610130 kubelet[1741]: E0212 20:34:42.609540 1741 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="200ms" Feb 12 20:34:42.611000 audit[1752]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.611000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff4104d1f0 a2=0 a3=7fff4104d1dc items=0 ppid=1741 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:34:42.614000 audit[1753]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.614000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc933c5630 a2=0 a3=7ffc933c561c items=0 ppid=1741 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:34:42.617000 audit[1755]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.617000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff0fec5720 a2=0 a3=7fff0fec570c items=0 ppid=1741 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.617000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:34:42.621000 audit[1757]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.621000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc482d4cc0 a2=0 a3=7ffc482d4cac items=0 ppid=1741 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.621000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:34:42.630000 audit[1760]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.630000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc11bde160 a2=0 a3=7ffc11bde14c items=0 ppid=1741 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:34:42.632266 kubelet[1741]: I0212 20:34:42.632223 1741 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:34:42.632000 audit[1761]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:34:42.632000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc93d9a850 a2=0 a3=7ffc93d9a83c items=0 ppid=1741 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.632000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:34:42.634010 kubelet[1741]: I0212 20:34:42.633908 1741 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:34:42.634010 kubelet[1741]: I0212 20:34:42.633927 1741 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:34:42.634010 kubelet[1741]: I0212 20:34:42.633950 1741 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:34:42.634165 kubelet[1741]: E0212 20:34:42.634015 1741 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:34:42.634000 audit[1763]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.634000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6ab0b930 a2=0 a3=7ffc6ab0b91c items=0 ppid=1741 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:34:42.635000 audit[1764]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.635000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4d75a880 a2=0 a3=7fff4d75a86c items=0 ppid=1741 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:34:42.636000 audit[1765]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:34:42.636000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91aa6cc0 a2=0 a3=7ffd91aa6cac items=0 ppid=1741 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.636000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:34:42.638000 audit[1766]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:34:42.638000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff73d6a2d0 a2=0 a3=7fff73d6a2bc items=0 ppid=1741 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:34:42.639000 audit[1767]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:34:42.639000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffec2223980 a2=0 a3=7ffec222396c items=0 ppid=1741 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:34:42.640000 audit[1768]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:34:42.640000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd0ffa59d0 a2=0 a3=7ffd0ffa59bc items=0 ppid=1741 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.640000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:34:42.646279 kubelet[1741]: W0212 20:34:42.646226 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.646279 kubelet[1741]: E0212 20:34:42.646281 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:42.660994 kubelet[1741]: I0212 20:34:42.660951 1741 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:34:42.660994 kubelet[1741]: I0212 20:34:42.660972 1741 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:34:42.660994 kubelet[1741]: I0212 20:34:42.660994 1741 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:34:42.663870 kubelet[1741]: I0212 20:34:42.663831 1741 policy_none.go:49] "None policy: Start" Feb 12 20:34:42.664654 kubelet[1741]: I0212 20:34:42.664621 1741 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:34:42.664761 kubelet[1741]: I0212 20:34:42.664669 1741 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:34:42.671342 systemd[1]: Created slice kubepods.slice. Feb 12 20:34:42.677616 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:34:42.689296 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:34:42.691223 kubelet[1741]: I0212 20:34:42.691194 1741 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:34:42.689000 audit[1741]: AVC avc: denied { mac_admin } for pid=1741 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:42.689000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:42.689000 audit[1741]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7dec0 a1=c00108a0f0 a2=c000b7de90 a3=25 items=0 ppid=1 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:42.689000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:42.691886 kubelet[1741]: I0212 20:34:42.691867 1741 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:34:42.692349 kubelet[1741]: I0212 20:34:42.692328 1741 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:34:42.694205 kubelet[1741]: E0212 20:34:42.694182 1741 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" not found" Feb 12 20:34:42.713565 kubelet[1741]: I0212 20:34:42.713532 1741 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.714077 kubelet[1741]: E0212 20:34:42.714051 1741 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.734610 kubelet[1741]: I0212 20:34:42.734560 1741 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:34:42.743165 kubelet[1741]: I0212 20:34:42.743133 1741 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:34:42.750452 kubelet[1741]: I0212 20:34:42.750410 1741 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:34:42.756290 systemd[1]: Created slice kubepods-burstable-pod6e47f82a4b1e8df08d18831d441e98e8.slice. Feb 12 20:34:42.769283 systemd[1]: Created slice kubepods-burstable-pod31da8f6e0835302a1221a5fcca2a5321.slice. Feb 12 20:34:42.775152 systemd[1]: Created slice kubepods-burstable-pod43a1f86293452565d7378560c7b148ad.slice. Feb 12 20:34:42.810207 kubelet[1741]: E0212 20:34:42.810168 1741 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="400ms" Feb 12 20:34:42.909773 kubelet[1741]: I0212 20:34:42.909631 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6e47f82a4b1e8df08d18831d441e98e8-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"6e47f82a4b1e8df08d18831d441e98e8\") " pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.910299 kubelet[1741]: I0212 20:34:42.910235 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6e47f82a4b1e8df08d18831d441e98e8-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"6e47f82a4b1e8df08d18831d441e98e8\") " pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.910716 kubelet[1741]: I0212 20:34:42.910686 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6e47f82a4b1e8df08d18831d441e98e8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"6e47f82a4b1e8df08d18831d441e98e8\") " pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.910909 kubelet[1741]: I0212 20:34:42.910893 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.911129 kubelet[1741]: I0212 20:34:42.911113 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.911361 kubelet[1741]: I0212 20:34:42.911346 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/43a1f86293452565d7378560c7b148ad-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"43a1f86293452565d7378560c7b148ad\") " pod="kube-system/kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.911612 kubelet[1741]: I0212 20:34:42.911570 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.911779 kubelet[1741]: I0212 20:34:42.911764 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.912023 kubelet[1741]: I0212 20:34:42.912008 1741 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.925006 kubelet[1741]: I0212 20:34:42.924980 1741 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:42.925426 kubelet[1741]: E0212 20:34:42.925391 1741 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:43.065979 env[1153]: time="2024-02-12T20:34:43.065913029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal,Uid:6e47f82a4b1e8df08d18831d441e98e8,Namespace:kube-system,Attempt:0,}" Feb 12 20:34:43.076058 env[1153]: time="2024-02-12T20:34:43.076000892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal,Uid:31da8f6e0835302a1221a5fcca2a5321,Namespace:kube-system,Attempt:0,}" Feb 12 20:34:43.078872 env[1153]: time="2024-02-12T20:34:43.078813011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal,Uid:43a1f86293452565d7378560c7b148ad,Namespace:kube-system,Attempt:0,}" Feb 12 20:34:43.210837 kubelet[1741]: E0212 20:34:43.210714 1741 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="800ms" Feb 12 20:34:43.330491 kubelet[1741]: I0212 20:34:43.330441 1741 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:43.330916 kubelet[1741]: E0212 20:34:43.330886 1741 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:43.482654 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3847371904.mount: Deactivated successfully. Feb 12 20:34:43.493052 env[1153]: time="2024-02-12T20:34:43.492994820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.494653 env[1153]: time="2024-02-12T20:34:43.494583299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.498260 env[1153]: time="2024-02-12T20:34:43.498212221Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.500117 env[1153]: time="2024-02-12T20:34:43.500058390Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.501326 env[1153]: time="2024-02-12T20:34:43.501270672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.503608 env[1153]: time="2024-02-12T20:34:43.503571207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.505263 env[1153]: time="2024-02-12T20:34:43.505194080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.506608 env[1153]: time="2024-02-12T20:34:43.506567379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.508718 env[1153]: time="2024-02-12T20:34:43.508669174Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.509827 env[1153]: time="2024-02-12T20:34:43.509790425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.513177 env[1153]: time="2024-02-12T20:34:43.513131428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.516598 env[1153]: time="2024-02-12T20:34:43.516561759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:34:43.568672 env[1153]: time="2024-02-12T20:34:43.568559575Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:34:43.568901 env[1153]: time="2024-02-12T20:34:43.568619859Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:34:43.568901 env[1153]: time="2024-02-12T20:34:43.568639799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:34:43.569094 env[1153]: time="2024-02-12T20:34:43.569011052Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02876ca8e5b7ba4a74fa96e3860efb694e48dffb8170d207e8b76a7cb397c818 pid=1789 runtime=io.containerd.runc.v2 Feb 12 20:34:43.569831 env[1153]: time="2024-02-12T20:34:43.569305529Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:34:43.569831 env[1153]: time="2024-02-12T20:34:43.569391350Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:34:43.569831 env[1153]: time="2024-02-12T20:34:43.569434984Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:34:43.569831 env[1153]: time="2024-02-12T20:34:43.569741000Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/47db310c977445d44ef93e258367f141d2ffa7286d6c7137090cffa2d7937994 pid=1791 runtime=io.containerd.runc.v2 Feb 12 20:34:43.578546 env[1153]: time="2024-02-12T20:34:43.577713759Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:34:43.578546 env[1153]: time="2024-02-12T20:34:43.577823559Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:34:43.578546 env[1153]: time="2024-02-12T20:34:43.577844492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:34:43.578546 env[1153]: time="2024-02-12T20:34:43.578176551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7f439ed60e959e2c473a41537ec287d00727cb3d4fe34f2b2cc0baeacc1e755 pid=1803 runtime=io.containerd.runc.v2 Feb 12 20:34:43.617797 systemd[1]: Started cri-containerd-02876ca8e5b7ba4a74fa96e3860efb694e48dffb8170d207e8b76a7cb397c818.scope. Feb 12 20:34:43.641743 systemd[1]: Started cri-containerd-47db310c977445d44ef93e258367f141d2ffa7286d6c7137090cffa2d7937994.scope. Feb 12 20:34:43.646564 kubelet[1741]: W0212 20:34:43.646496 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.647171 kubelet[1741]: E0212 20:34:43.647147 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.663000 audit: BPF prog-id=67 op=LOAD Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1789 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383736636138653562376261346137346661393665333836306566 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1789 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383736636138653562376261346137346661393665333836306566 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit: BPF prog-id=68 op=LOAD Feb 12 20:34:43.666000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ce3f0 items=0 ppid=1789 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383736636138653562376261346137346661393665333836306566 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit: BPF prog-id=69 op=LOAD Feb 12 20:34:43.666000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ce438 items=0 ppid=1789 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383736636138653562376261346137346661393665333836306566 Feb 12 20:34:43.666000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:34:43.666000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.666000 audit: BPF prog-id=70 op=LOAD Feb 12 20:34:43.666000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce848 items=0 ppid=1789 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383736636138653562376261346137346661393665333836306566 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.686000 audit: BPF prog-id=71 op=LOAD Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1791 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646233313063393737343435643434656639336532353833363766 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1791 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646233313063393737343435643434656639336532353833363766 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit: BPF prog-id=72 op=LOAD Feb 12 20:34:43.687000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002fe570 items=0 ppid=1791 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646233313063393737343435643434656639336532353833363766 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit: BPF prog-id=73 op=LOAD Feb 12 20:34:43.687000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002fe5b8 items=0 ppid=1791 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646233313063393737343435643434656639336532353833363766 Feb 12 20:34:43.687000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:34:43.687000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.687000 audit: BPF prog-id=74 op=LOAD Feb 12 20:34:43.687000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fe9c8 items=0 ppid=1791 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437646233313063393737343435643434656639336532353833363766 Feb 12 20:34:43.708881 systemd[1]: Started cri-containerd-b7f439ed60e959e2c473a41537ec287d00727cb3d4fe34f2b2cc0baeacc1e755.scope. Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.728000 audit: BPF prog-id=75 op=LOAD Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1803 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663433396564363065393539653263343733613431353337656332 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1803 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663433396564363065393539653263343733613431353337656332 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit: BPF prog-id=76 op=LOAD Feb 12 20:34:43.729000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003820c0 items=0 ppid=1803 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663433396564363065393539653263343733613431353337656332 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit: BPF prog-id=77 op=LOAD Feb 12 20:34:43.729000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000382108 items=0 ppid=1803 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663433396564363065393539653263343733613431353337656332 Feb 12 20:34:43.729000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:34:43.729000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { perfmon } for pid=1835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit[1835]: AVC avc: denied { bpf } for pid=1835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:43.729000 audit: BPF prog-id=78 op=LOAD Feb 12 20:34:43.729000 audit[1835]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000382518 items=0 ppid=1803 pid=1835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:43.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663433396564363065393539653263343733613431353337656332 Feb 12 20:34:43.770360 env[1153]: time="2024-02-12T20:34:43.770296182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal,Uid:6e47f82a4b1e8df08d18831d441e98e8,Namespace:kube-system,Attempt:0,} returns sandbox id \"47db310c977445d44ef93e258367f141d2ffa7286d6c7137090cffa2d7937994\"" Feb 12 20:34:43.773001 kubelet[1741]: E0212 20:34:43.772574 1741 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-21291" Feb 12 20:34:43.777224 env[1153]: time="2024-02-12T20:34:43.775523600Z" level=info msg="CreateContainer within sandbox \"47db310c977445d44ef93e258367f141d2ffa7286d6c7137090cffa2d7937994\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 20:34:43.804564 kubelet[1741]: W0212 20:34:43.804492 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.804564 kubelet[1741]: E0212 20:34:43.804572 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.805285 env[1153]: time="2024-02-12T20:34:43.805227410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal,Uid:43a1f86293452565d7378560c7b148ad,Namespace:kube-system,Attempt:0,} returns sandbox id \"02876ca8e5b7ba4a74fa96e3860efb694e48dffb8170d207e8b76a7cb397c818\"" Feb 12 20:34:43.808046 kubelet[1741]: E0212 20:34:43.808022 1741 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-21291" Feb 12 20:34:43.809966 env[1153]: time="2024-02-12T20:34:43.809910865Z" level=info msg="CreateContainer within sandbox \"02876ca8e5b7ba4a74fa96e3860efb694e48dffb8170d207e8b76a7cb397c818\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 20:34:43.817647 env[1153]: time="2024-02-12T20:34:43.817584141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal,Uid:31da8f6e0835302a1221a5fcca2a5321,Namespace:kube-system,Attempt:0,} returns sandbox id \"b7f439ed60e959e2c473a41537ec287d00727cb3d4fe34f2b2cc0baeacc1e755\"" Feb 12 20:34:43.818952 kubelet[1741]: E0212 20:34:43.818923 1741 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flat" Feb 12 20:34:43.820737 env[1153]: time="2024-02-12T20:34:43.820699086Z" level=info msg="CreateContainer within sandbox \"b7f439ed60e959e2c473a41537ec287d00727cb3d4fe34f2b2cc0baeacc1e755\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 20:34:43.931190 kubelet[1741]: W0212 20:34:43.931109 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.931190 kubelet[1741]: E0212 20:34:43.931194 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.24:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.974756 kubelet[1741]: W0212 20:34:43.974660 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:43.974756 kubelet[1741]: E0212 20:34:43.974740 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:44.011618 kubelet[1741]: E0212 20:34:44.011494 1741 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="1.6s" Feb 12 20:34:44.136895 kubelet[1741]: I0212 20:34:44.136848 1741 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:44.137309 kubelet[1741]: E0212 20:34:44.137269 1741 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:44.647286 kubelet[1741]: E0212 20:34:44.647237 1741 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.24:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:45.153933 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount833983311.mount: Deactivated successfully. Feb 12 20:34:45.504365 kubelet[1741]: W0212 20:34:45.504227 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:45.504365 kubelet[1741]: E0212 20:34:45.504286 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.24:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:45.601781 kubelet[1741]: W0212 20:34:45.601719 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:45.601781 kubelet[1741]: E0212 20:34:45.601774 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.24:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:45.612574 kubelet[1741]: E0212 20:34:45.612524 1741 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.24:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.24:6443: connect: connection refused" interval="3.2s" Feb 12 20:34:45.743203 kubelet[1741]: I0212 20:34:45.743163 1741 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:45.743779 kubelet[1741]: E0212 20:34:45.743652 1741 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.24:6443/api/v1/nodes\": dial tcp 10.128.0.24:6443: connect: connection refused" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:45.773985 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1173147228.mount: Deactivated successfully. Feb 12 20:34:46.102979 env[1153]: time="2024-02-12T20:34:46.102906831Z" level=info msg="CreateContainer within sandbox \"02876ca8e5b7ba4a74fa96e3860efb694e48dffb8170d207e8b76a7cb397c818\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"888d064ae15869ae1d3e5ca39dbf4f913224682e0c1d8eeccf16cfa8ce80312d\"" Feb 12 20:34:46.104978 env[1153]: time="2024-02-12T20:34:46.104919126Z" level=info msg="CreateContainer within sandbox \"47db310c977445d44ef93e258367f141d2ffa7286d6c7137090cffa2d7937994\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2f022bb2f5d47eb5072bc79bd864e5e08cd017857b16cfa2f08d569f964c8563\"" Feb 12 20:34:46.105654 env[1153]: time="2024-02-12T20:34:46.104987304Z" level=info msg="StartContainer for \"888d064ae15869ae1d3e5ca39dbf4f913224682e0c1d8eeccf16cfa8ce80312d\"" Feb 12 20:34:46.107014 env[1153]: time="2024-02-12T20:34:46.106977936Z" level=info msg="StartContainer for \"2f022bb2f5d47eb5072bc79bd864e5e08cd017857b16cfa2f08d569f964c8563\"" Feb 12 20:34:46.113979 env[1153]: time="2024-02-12T20:34:46.113922527Z" level=info msg="CreateContainer within sandbox \"b7f439ed60e959e2c473a41537ec287d00727cb3d4fe34f2b2cc0baeacc1e755\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"34627e7c7bd8d56bd78d9d02840a78066bbc9e3ea6f8bd16373b41b23db5d48f\"" Feb 12 20:34:46.115678 env[1153]: time="2024-02-12T20:34:46.115638084Z" level=info msg="StartContainer for \"34627e7c7bd8d56bd78d9d02840a78066bbc9e3ea6f8bd16373b41b23db5d48f\"" Feb 12 20:34:46.153386 systemd[1]: Started cri-containerd-888d064ae15869ae1d3e5ca39dbf4f913224682e0c1d8eeccf16cfa8ce80312d.scope. Feb 12 20:34:46.175052 systemd[1]: Started cri-containerd-2f022bb2f5d47eb5072bc79bd864e5e08cd017857b16cfa2f08d569f964c8563.scope. Feb 12 20:34:46.188617 systemd[1]: Started cri-containerd-34627e7c7bd8d56bd78d9d02840a78066bbc9e3ea6f8bd16373b41b23db5d48f.scope. Feb 12 20:34:46.218962 kernel: kauditd_printk_skb: 388 callbacks suppressed Feb 12 20:34:46.219140 kernel: audit: type=1400 audit(1707770086.191:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.252490 kernel: audit: type=1400 audit(1707770086.191:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.256612 kubelet[1741]: W0212 20:34:46.256541 1741 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:46.256769 kubelet[1741]: E0212 20:34:46.256629 1741 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.24:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.24:6443: connect: connection refused Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.283561 kernel: audit: type=1400 audit(1707770086.191:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.333355 kernel: audit: type=1400 audit(1707770086.191:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.333476 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:34:46.333530 kernel: audit: type=1400 audit(1707770086.191:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.333576 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 20:34:46.333614 kernel: audit: backlog limit exceeded Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.365165 kernel: audit: type=1400 audit(1707770086.191:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.389631 kernel: audit: type=1400 audit(1707770086.191:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.228000 audit: BPF prog-id=79 op=LOAD Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1789 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386430363461653135383639616531643365356361333964626634 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1789 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386430363461653135383639616531643365356361333964626634 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit: BPF prog-id=80 op=LOAD Feb 12 20:34:46.229000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028fa70 items=0 ppid=1789 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386430363461653135383639616531643365356361333964626634 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit: BPF prog-id=81 op=LOAD Feb 12 20:34:46.229000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028fab8 items=0 ppid=1789 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386430363461653135383639616531643365356361333964626634 Feb 12 20:34:46.229000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:34:46.229000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { perfmon } for pid=1919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit[1919]: AVC avc: denied { bpf } for pid=1919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.229000 audit: BPF prog-id=82 op=LOAD Feb 12 20:34:46.229000 audit[1919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028fec8 items=0 ppid=1789 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838386430363461653135383639616531643365356361333964626634 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.363000 audit: BPF prog-id=83 op=LOAD Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.369000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit: BPF prog-id=85 op=LOAD Feb 12 20:34:46.369000 audit: BPF prog-id=84 op=LOAD Feb 12 20:34:46.369000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c000456010 items=0 ppid=1791 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266303232626232663564343765623530373262633739626438363465 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1803 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363237653763376264386435366264373864396430323834306137 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1803 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363237653763376264386435366264373864396430323834306137 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit: BPF prog-id=86 op=LOAD Feb 12 20:34:46.395000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00021a540 items=0 ppid=1803 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363237653763376264386435366264373864396430323834306137 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit: BPF prog-id=87 op=LOAD Feb 12 20:34:46.395000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00021a588 items=0 ppid=1803 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363237653763376264386435366264373864396430323834306137 Feb 12 20:34:46.395000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:34:46.395000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { perfmon } for pid=1920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit[1920]: AVC avc: denied { bpf } for pid=1920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.395000 audit: BPF prog-id=88 op=LOAD Feb 12 20:34:46.395000 audit[1920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00021a998 items=0 ppid=1803 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334363237653763376264386435366264373864396430323834306137 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.394000 audit: BPF prog-id=89 op=LOAD Feb 12 20:34:46.394000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000211388 items=0 ppid=1791 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266303232626232663564343765623530373262633739626438363465 Feb 12 20:34:46.399000 audit: BPF prog-id=89 op=UNLOAD Feb 12 20:34:46.399000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:46.399000 audit: BPF prog-id=90 op=LOAD Feb 12 20:34:46.399000 audit[1926]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000211798 items=0 ppid=1791 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:46.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266303232626232663564343765623530373262633739626438363465 Feb 12 20:34:46.433494 env[1153]: time="2024-02-12T20:34:46.433420943Z" level=info msg="StartContainer for \"888d064ae15869ae1d3e5ca39dbf4f913224682e0c1d8eeccf16cfa8ce80312d\" returns successfully" Feb 12 20:34:46.470228 env[1153]: time="2024-02-12T20:34:46.470176022Z" level=info msg="StartContainer for \"34627e7c7bd8d56bd78d9d02840a78066bbc9e3ea6f8bd16373b41b23db5d48f\" returns successfully" Feb 12 20:34:46.490025 env[1153]: time="2024-02-12T20:34:46.489967230Z" level=info msg="StartContainer for \"2f022bb2f5d47eb5072bc79bd864e5e08cd017857b16cfa2f08d569f964c8563\" returns successfully" Feb 12 20:34:48.950927 kubelet[1741]: I0212 20:34:48.950889 1741 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:50.091000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:50.091000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c009c7a450 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:34:50.091000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:50.094000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:50.094000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c009c7a4b0 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:34:50.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:50.101000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:50.101000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c004df0810 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:34:50.101000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:50.103000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:50.103000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c009900b80 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:34:50.103000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:50.117000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:50.117000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c004555980 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:34:50.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:50.117000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:50.117000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c000d5ad50 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:34:50.117000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:34:50.432700 kubelet[1741]: I0212 20:34:50.432535 1741 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:50.529364 kubelet[1741]: E0212 20:34:50.529316 1741 controller.go:146] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="6.4s" Feb 12 20:34:50.603060 kubelet[1741]: I0212 20:34:50.602689 1741 apiserver.go:52] "Watching apiserver" Feb 12 20:34:50.609406 kubelet[1741]: I0212 20:34:50.609324 1741 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:34:50.689216 kubelet[1741]: I0212 20:34:50.689092 1741 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:34:51.045000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:51.045000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c66030 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:34:51.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:51.046000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:51.046000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0000a4880 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:34:51.046000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:52.668534 systemd[1]: Reloading. Feb 12 20:34:52.781246 /usr/lib/systemd/system-generators/torcx-generator[2030]: time="2024-02-12T20:34:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:34:52.781304 /usr/lib/systemd/system-generators/torcx-generator[2030]: time="2024-02-12T20:34:52Z" level=info msg="torcx already run" Feb 12 20:34:52.888418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:34:52.888444 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:34:52.912102 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:34:53.042684 kernel: kauditd_printk_skb: 205 callbacks suppressed Feb 12 20:34:53.042861 kernel: audit: type=1400 audit(1707770093.015:724): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.085537 kernel: audit: type=1400 audit(1707770093.015:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.085697 kernel: audit: type=1400 audit(1707770093.020:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.109505 kernel: audit: type=1400 audit(1707770093.020:727): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.109597 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:34:53.136065 kernel: audit: type=1400 audit(1707770093.020:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.136225 kernel: audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.167902 kernel: audit: type=1400 audit(1707770093.020:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.168060 kernel: audit: backlog limit exceeded Feb 12 20:34:53.168096 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.042000 audit: BPF prog-id=91 op=LOAD Feb 12 20:34:53.042000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.063000 audit: BPF prog-id=92 op=LOAD Feb 12 20:34:53.063000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.085000 audit: BPF prog-id=93 op=LOAD Feb 12 20:34:53.085000 audit: BPF prog-id=52 op=UNLOAD Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.086000 audit: BPF prog-id=94 op=LOAD Feb 12 20:34:53.086000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit: BPF prog-id=95 op=LOAD Feb 12 20:34:53.107000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.108000 audit: BPF prog-id=96 op=LOAD Feb 12 20:34:53.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit: BPF prog-id=97 op=LOAD Feb 12 20:34:53.173000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:34:53.173000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.173000 audit: BPF prog-id=98 op=LOAD Feb 12 20:34:53.173000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit: BPF prog-id=99 op=LOAD Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.174000 audit: BPF prog-id=100 op=LOAD Feb 12 20:34:53.174000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:34:53.174000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.176000 audit: BPF prog-id=101 op=LOAD Feb 12 20:34:53.176000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.177000 audit: BPF prog-id=102 op=LOAD Feb 12 20:34:53.177000 audit: BPF prog-id=85 op=UNLOAD Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.179000 audit: BPF prog-id=103 op=LOAD Feb 12 20:34:53.179000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.180000 audit: BPF prog-id=104 op=LOAD Feb 12 20:34:53.180000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.182000 audit: BPF prog-id=105 op=LOAD Feb 12 20:34:53.182000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit: BPF prog-id=106 op=LOAD Feb 12 20:34:53.183000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit: BPF prog-id=107 op=LOAD Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.183000 audit: BPF prog-id=108 op=LOAD Feb 12 20:34:53.183000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:34:53.183000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit: BPF prog-id=109 op=LOAD Feb 12 20:34:53.186000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit: BPF prog-id=110 op=LOAD Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.186000 audit: BPF prog-id=111 op=LOAD Feb 12 20:34:53.186000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:34:53.186000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:34:53.207684 kubelet[1741]: I0212 20:34:53.207115 1741 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:34:53.207427 systemd[1]: Stopping kubelet.service... Feb 12 20:34:53.228873 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:34:53.229161 systemd[1]: Stopped kubelet.service. Feb 12 20:34:53.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:53.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:53.231808 systemd[1]: Started kubelet.service. Feb 12 20:34:53.353048 kubelet[2075]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:34:53.353563 kubelet[2075]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:34:53.353677 kubelet[2075]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:34:53.353954 kubelet[2075]: I0212 20:34:53.353901 2075 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:34:53.365972 kubelet[2075]: I0212 20:34:53.365937 2075 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:34:53.365972 kubelet[2075]: I0212 20:34:53.365971 2075 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:34:53.366284 kubelet[2075]: I0212 20:34:53.366261 2075 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:34:53.369313 kubelet[2075]: I0212 20:34:53.369285 2075 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:34:53.374234 kubelet[2075]: I0212 20:34:53.374202 2075 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:34:53.376237 kubelet[2075]: I0212 20:34:53.376206 2075 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:34:53.376558 kubelet[2075]: I0212 20:34:53.376536 2075 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:34:53.376655 kubelet[2075]: I0212 20:34:53.376638 2075 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:34:53.376808 kubelet[2075]: I0212 20:34:53.376665 2075 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:34:53.376808 kubelet[2075]: I0212 20:34:53.376685 2075 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:34:53.376808 kubelet[2075]: I0212 20:34:53.376725 2075 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:34:53.382599 kubelet[2075]: I0212 20:34:53.382571 2075 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:34:53.382719 kubelet[2075]: I0212 20:34:53.382605 2075 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:34:53.382719 kubelet[2075]: I0212 20:34:53.382630 2075 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:34:53.382719 kubelet[2075]: I0212 20:34:53.382646 2075 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:34:53.383942 kubelet[2075]: I0212 20:34:53.383905 2075 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:34:53.409427 kubelet[2075]: I0212 20:34:53.409387 2075 server.go:1168] "Started kubelet" Feb 12 20:34:53.415000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.415000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:53.415000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ce11a0 a1=c00073aa38 a2=c000ce1170 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:53.417779 kubelet[2075]: I0212 20:34:53.417431 2075 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:34:53.415000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:53.415000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.415000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:53.415000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000737520 a1=c00073aa50 a2=c000ce1230 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:53.415000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:53.423530 kubelet[2075]: I0212 20:34:53.423499 2075 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:34:53.423659 kubelet[2075]: I0212 20:34:53.423552 2075 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:34:53.431023 kubelet[2075]: E0212 20:34:53.430985 2075 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:34:53.431023 kubelet[2075]: E0212 20:34:53.431023 2075 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:34:53.437888 kubelet[2075]: I0212 20:34:53.437845 2075 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:34:53.439380 kubelet[2075]: I0212 20:34:53.439354 2075 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:34:53.440957 kubelet[2075]: I0212 20:34:53.440931 2075 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:34:53.457375 kubelet[2075]: I0212 20:34:53.457330 2075 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:34:53.462181 kubelet[2075]: I0212 20:34:53.459987 2075 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:34:53.492975 kubelet[2075]: I0212 20:34:53.492935 2075 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:34:53.494611 kubelet[2075]: I0212 20:34:53.494583 2075 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:34:53.494611 kubelet[2075]: I0212 20:34:53.494611 2075 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:34:53.494792 kubelet[2075]: I0212 20:34:53.494634 2075 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:34:53.494792 kubelet[2075]: E0212 20:34:53.494701 2075 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:34:53.563532 kubelet[2075]: I0212 20:34:53.563499 2075 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.595633 kubelet[2075]: E0212 20:34:53.595587 2075 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.601783 2075 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.601810 2075 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.601834 2075 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.602043 2075 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.602061 2075 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.602074 2075 policy_none.go:49] "None policy: Start" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.604089 2075 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.604191 2075 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:34:53.605417 kubelet[2075]: I0212 20:34:53.604495 2075 state_mem.go:75] "Updated machine memory state" Feb 12 20:34:53.607277 kubelet[2075]: I0212 20:34:53.607239 2075 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.607414 kubelet[2075]: I0212 20:34:53.607325 2075 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.612000 audit[2075]: AVC avc: denied { mac_admin } for pid=2075 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:34:53.612000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:34:53.612000 audit[2075]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011ce3f0 a1=c0011fa1b0 a2=c0011ce3c0 a3=25 items=0 ppid=1 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:34:53.612000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:34:53.614034 kubelet[2075]: I0212 20:34:53.613462 2075 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:34:53.614034 kubelet[2075]: I0212 20:34:53.613605 2075 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:34:53.614034 kubelet[2075]: I0212 20:34:53.613899 2075 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:34:53.796617 kubelet[2075]: I0212 20:34:53.796567 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:34:53.796804 kubelet[2075]: I0212 20:34:53.796699 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:34:53.796804 kubelet[2075]: I0212 20:34:53.796752 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:34:53.812014 kubelet[2075]: W0212 20:34:53.811959 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 12 20:34:53.813949 kubelet[2075]: W0212 20:34:53.813917 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 12 20:34:53.814364 kubelet[2075]: W0212 20:34:53.814330 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 12 20:34:53.867751 kubelet[2075]: I0212 20:34:53.867612 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.867751 kubelet[2075]: I0212 20:34:53.867705 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/43a1f86293452565d7378560c7b148ad-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"43a1f86293452565d7378560c7b148ad\") " pod="kube-system/kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868000 kubelet[2075]: I0212 20:34:53.867763 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6e47f82a4b1e8df08d18831d441e98e8-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"6e47f82a4b1e8df08d18831d441e98e8\") " pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868000 kubelet[2075]: I0212 20:34:53.867801 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6e47f82a4b1e8df08d18831d441e98e8-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"6e47f82a4b1e8df08d18831d441e98e8\") " pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868000 kubelet[2075]: I0212 20:34:53.867862 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868000 kubelet[2075]: I0212 20:34:53.867919 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868234 kubelet[2075]: I0212 20:34:53.867957 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6e47f82a4b1e8df08d18831d441e98e8-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"6e47f82a4b1e8df08d18831d441e98e8\") " pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868234 kubelet[2075]: I0212 20:34:53.868011 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:53.868234 kubelet[2075]: I0212 20:34:53.868077 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/31da8f6e0835302a1221a5fcca2a5321-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" (UID: \"31da8f6e0835302a1221a5fcca2a5321\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:54.262695 update_engine[1138]: I0212 20:34:54.262547 1138 update_attempter.cc:509] Updating boot flags... Feb 12 20:34:54.412350 kubelet[2075]: I0212 20:34:54.409584 2075 apiserver.go:52] "Watching apiserver" Feb 12 20:34:54.461181 kubelet[2075]: I0212 20:34:54.461139 2075 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:34:54.478310 kubelet[2075]: I0212 20:34:54.478269 2075 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:34:54.587206 kubelet[2075]: W0212 20:34:54.587164 2075 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Feb 12 20:34:54.587402 kubelet[2075]: E0212 20:34:54.587271 2075 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:34:54.627150 kubelet[2075]: I0212 20:34:54.627107 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" podStartSLOduration=1.627020787 podCreationTimestamp="2024-02-12 20:34:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:34:54.605667554 +0000 UTC m=+1.363210447" watchObservedRunningTime="2024-02-12 20:34:54.627020787 +0000 UTC m=+1.384563671" Feb 12 20:34:54.656088 kubelet[2075]: I0212 20:34:54.656028 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" podStartSLOduration=1.6559783700000001 podCreationTimestamp="2024-02-12 20:34:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:34:54.627486816 +0000 UTC m=+1.385029710" watchObservedRunningTime="2024-02-12 20:34:54.65597837 +0000 UTC m=+1.413521264" Feb 12 20:34:54.673824 kubelet[2075]: I0212 20:34:54.673784 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" podStartSLOduration=1.673716679 podCreationTimestamp="2024-02-12 20:34:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:34:54.656872882 +0000 UTC m=+1.414415776" watchObservedRunningTime="2024-02-12 20:34:54.673716679 +0000 UTC m=+1.431259561" Feb 12 20:34:55.997000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:55.997000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5bd60 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:34:55.997000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:56.005000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:56.005000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c5bea0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:34:56.005000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:56.010000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:56.010000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c5bfe0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:34:56.010000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:56.019000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:34:56.019000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f208c0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:34:56.019000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:34:58.395043 sudo[1358]: pam_unix(sudo:session): session closed for user root Feb 12 20:34:58.393000 audit[1358]: USER_END pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:58.400713 kernel: kauditd_printk_skb: 264 callbacks suppressed Feb 12 20:34:58.400853 kernel: audit: type=1106 audit(1707770098.393:975): pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:58.395000 audit[1358]: CRED_DISP pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:58.448494 kernel: audit: type=1104 audit(1707770098.395:976): pid=1358 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:34:58.459744 sshd[1355]: pam_unix(sshd:session): session closed for user core Feb 12 20:34:58.460000 audit[1355]: USER_END pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:58.465359 systemd[1]: sshd@6-10.128.0.24:22-147.75.109.163:54476.service: Deactivated successfully. Feb 12 20:34:58.466521 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:34:58.466741 systemd[1]: session-7.scope: Consumed 5.505s CPU time. Feb 12 20:34:58.468768 systemd-logind[1135]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:34:58.470704 systemd-logind[1135]: Removed session 7. Feb 12 20:34:58.460000 audit[1355]: CRED_DISP pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:58.495500 kernel: audit: type=1106 audit(1707770098.460:977): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:58.495585 kernel: audit: type=1104 audit(1707770098.460:978): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:34:58.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.24:22-147.75.109.163:54476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:34:58.519906 kernel: audit: type=1131 audit(1707770098.460:979): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.24:22-147.75.109.163:54476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:07.075000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:35:07.075000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d13380 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:07.138081 kernel: audit: type=1400 audit(1707770107.075:980): avc: denied { watch } for pid=1961 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521043 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:35:07.138263 kernel: audit: type=1300 audit(1707770107.075:980): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000d13380 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:07.138316 kernel: audit: type=1327 audit(1707770107.075:980): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:07.075000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:07.668904 kubelet[2075]: I0212 20:35:07.668869 2075 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 20:35:07.670441 env[1153]: time="2024-02-12T20:35:07.670330686Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:35:07.671342 kubelet[2075]: I0212 20:35:07.671319 2075 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 20:35:08.457995 kubelet[2075]: I0212 20:35:08.457939 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:08.468854 systemd[1]: Created slice kubepods-besteffort-pod728f07d4_f71a_4aeb_a7ad_a3ba55429a39.slice. Feb 12 20:35:08.573070 kubelet[2075]: I0212 20:35:08.573007 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/728f07d4-f71a-4aeb-a7ad-a3ba55429a39-kube-proxy\") pod \"kube-proxy-4zgjb\" (UID: \"728f07d4-f71a-4aeb-a7ad-a3ba55429a39\") " pod="kube-system/kube-proxy-4zgjb" Feb 12 20:35:08.573070 kubelet[2075]: I0212 20:35:08.573074 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/728f07d4-f71a-4aeb-a7ad-a3ba55429a39-xtables-lock\") pod \"kube-proxy-4zgjb\" (UID: \"728f07d4-f71a-4aeb-a7ad-a3ba55429a39\") " pod="kube-system/kube-proxy-4zgjb" Feb 12 20:35:08.573347 kubelet[2075]: I0212 20:35:08.573107 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/728f07d4-f71a-4aeb-a7ad-a3ba55429a39-lib-modules\") pod \"kube-proxy-4zgjb\" (UID: \"728f07d4-f71a-4aeb-a7ad-a3ba55429a39\") " pod="kube-system/kube-proxy-4zgjb" Feb 12 20:35:08.573347 kubelet[2075]: I0212 20:35:08.573137 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n8jh5\" (UniqueName: \"kubernetes.io/projected/728f07d4-f71a-4aeb-a7ad-a3ba55429a39-kube-api-access-n8jh5\") pod \"kube-proxy-4zgjb\" (UID: \"728f07d4-f71a-4aeb-a7ad-a3ba55429a39\") " pod="kube-system/kube-proxy-4zgjb" Feb 12 20:35:08.621484 kubelet[2075]: I0212 20:35:08.621418 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:08.630691 systemd[1]: Created slice kubepods-besteffort-podf49564b1_6edb_44f2_b5dd_e07be08c48d9.slice. Feb 12 20:35:08.673710 kubelet[2075]: I0212 20:35:08.673663 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gntwv\" (UniqueName: \"kubernetes.io/projected/f49564b1-6edb-44f2-b5dd-e07be08c48d9-kube-api-access-gntwv\") pod \"tigera-operator-7ff8dc855-qrggs\" (UID: \"f49564b1-6edb-44f2-b5dd-e07be08c48d9\") " pod="tigera-operator/tigera-operator-7ff8dc855-qrggs" Feb 12 20:35:08.674275 kubelet[2075]: I0212 20:35:08.673752 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f49564b1-6edb-44f2-b5dd-e07be08c48d9-var-lib-calico\") pod \"tigera-operator-7ff8dc855-qrggs\" (UID: \"f49564b1-6edb-44f2-b5dd-e07be08c48d9\") " pod="tigera-operator/tigera-operator-7ff8dc855-qrggs" Feb 12 20:35:08.779139 env[1153]: time="2024-02-12T20:35:08.778599890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4zgjb,Uid:728f07d4-f71a-4aeb-a7ad-a3ba55429a39,Namespace:kube-system,Attempt:0,}" Feb 12 20:35:08.815807 env[1153]: time="2024-02-12T20:35:08.815070893Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:08.815807 env[1153]: time="2024-02-12T20:35:08.815158362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:08.815807 env[1153]: time="2024-02-12T20:35:08.815179277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:08.820130 env[1153]: time="2024-02-12T20:35:08.816523842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/363bce20c29462348f6678f83de032b49bc7a657a75500078d1914d63a1331e4 pid=2176 runtime=io.containerd.runc.v2 Feb 12 20:35:08.848669 systemd[1]: Started cri-containerd-363bce20c29462348f6678f83de032b49bc7a657a75500078d1914d63a1331e4.scope. Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.908249 kernel: audit: type=1400 audit(1707770108.866:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.908379 kernel: audit: type=1400 audit(1707770108.866:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.950805 kernel: audit: type=1400 audit(1707770108.866:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.950931 kernel: audit: type=1400 audit(1707770108.866:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.950980 kernel: audit: type=1400 audit(1707770108.866:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.951768 env[1153]: time="2024-02-12T20:35:08.951724241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-qrggs,Uid:f49564b1-6edb-44f2-b5dd-e07be08c48d9,Namespace:tigera-operator,Attempt:0,}" Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.994892 kernel: audit: type=1400 audit(1707770108.866:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.995013 kernel: audit: type=1400 audit(1707770108.866:987): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.908000 audit: BPF prog-id=112 op=LOAD Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2176 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:08.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336336263653230633239343632333438663636373866383364653033 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2176 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:08.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336336263653230633239343632333438663636373866383364653033 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.919000 audit: BPF prog-id=113 op=LOAD Feb 12 20:35:08.919000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002516b0 items=0 ppid=2176 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:08.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336336263653230633239343632333438663636373866383364653033 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.949000 audit: BPF prog-id=114 op=LOAD Feb 12 20:35:08.949000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002516f8 items=0 ppid=2176 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:08.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336336263653230633239343632333438663636373866383364653033 Feb 12 20:35:08.970000 audit: BPF prog-id=114 op=UNLOAD Feb 12 20:35:08.970000 audit: BPF prog-id=113 op=UNLOAD Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { perfmon } for pid=2188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit[2188]: AVC avc: denied { bpf } for pid=2188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:08.970000 audit: BPF prog-id=115 op=LOAD Feb 12 20:35:08.970000 audit[2188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000251b08 items=0 ppid=2176 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:08.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336336263653230633239343632333438663636373866383364653033 Feb 12 20:35:09.039452 env[1153]: time="2024-02-12T20:35:09.036302201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4zgjb,Uid:728f07d4-f71a-4aeb-a7ad-a3ba55429a39,Namespace:kube-system,Attempt:0,} returns sandbox id \"363bce20c29462348f6678f83de032b49bc7a657a75500078d1914d63a1331e4\"" Feb 12 20:35:09.045231 env[1153]: time="2024-02-12T20:35:09.045173432Z" level=info msg="CreateContainer within sandbox \"363bce20c29462348f6678f83de032b49bc7a657a75500078d1914d63a1331e4\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:35:09.045381 env[1153]: time="2024-02-12T20:35:09.043895659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:09.045381 env[1153]: time="2024-02-12T20:35:09.043943839Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:09.045381 env[1153]: time="2024-02-12T20:35:09.043962881Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:09.045381 env[1153]: time="2024-02-12T20:35:09.044136873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/758b1057dff815d7c94d39a28071ca8fe81185b81a88739e8183474fa7a8a928 pid=2218 runtime=io.containerd.runc.v2 Feb 12 20:35:09.065304 systemd[1]: Started cri-containerd-758b1057dff815d7c94d39a28071ca8fe81185b81a88739e8183474fa7a8a928.scope. Feb 12 20:35:09.071538 env[1153]: time="2024-02-12T20:35:09.069616460Z" level=info msg="CreateContainer within sandbox \"363bce20c29462348f6678f83de032b49bc7a657a75500078d1914d63a1331e4\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"79e5034ab22211cc924ab30ed5315f1f9b05ac69192a6aa9d856f9856d38d041\"" Feb 12 20:35:09.072741 env[1153]: time="2024-02-12T20:35:09.072695415Z" level=info msg="StartContainer for \"79e5034ab22211cc924ab30ed5315f1f9b05ac69192a6aa9d856f9856d38d041\"" Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.095000 audit: BPF prog-id=116 op=LOAD Feb 12 20:35:09.097000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.097000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2218 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386231303537646666383135643763393464333961323830373163 Feb 12 20:35:09.097000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.097000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2218 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386231303537646666383135643763393464333961323830373163 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.098000 audit: BPF prog-id=117 op=LOAD Feb 12 20:35:09.098000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025720 items=0 ppid=2218 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386231303537646666383135643763393464333961323830373163 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.099000 audit: BPF prog-id=118 op=LOAD Feb 12 20:35:09.099000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025768 items=0 ppid=2218 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386231303537646666383135643763393464333961323830373163 Feb 12 20:35:09.100000 audit: BPF prog-id=118 op=UNLOAD Feb 12 20:35:09.100000 audit: BPF prog-id=117 op=UNLOAD Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.100000 audit: BPF prog-id=119 op=LOAD Feb 12 20:35:09.100000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025b78 items=0 ppid=2218 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735386231303537646666383135643763393464333961323830373163 Feb 12 20:35:09.110286 systemd[1]: Started cri-containerd-79e5034ab22211cc924ab30ed5315f1f9b05ac69192a6aa9d856f9856d38d041.scope. Feb 12 20:35:09.156000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.156000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f460d6fd188 items=0 ppid=2176 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653530333461623232323131636339323461623330656435333135 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.157000 audit: BPF prog-id=120 op=LOAD Feb 12 20:35:09.157000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00039bf68 items=0 ppid=2176 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653530333461623232323131636339323461623330656435333135 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.158000 audit: BPF prog-id=121 op=LOAD Feb 12 20:35:09.158000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00039bfb8 items=0 ppid=2176 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653530333461623232323131636339323461623330656435333135 Feb 12 20:35:09.159000 audit: BPF prog-id=121 op=UNLOAD Feb 12 20:35:09.159000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:09.159000 audit: BPF prog-id=122 op=LOAD Feb 12 20:35:09.159000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003ee048 items=0 ppid=2176 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653530333461623232323131636339323461623330656435333135 Feb 12 20:35:09.187812 env[1153]: time="2024-02-12T20:35:09.187748942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-qrggs,Uid:f49564b1-6edb-44f2-b5dd-e07be08c48d9,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"758b1057dff815d7c94d39a28071ca8fe81185b81a88739e8183474fa7a8a928\"" Feb 12 20:35:09.194317 env[1153]: time="2024-02-12T20:35:09.194242131Z" level=info msg="StartContainer for \"79e5034ab22211cc924ab30ed5315f1f9b05ac69192a6aa9d856f9856d38d041\" returns successfully" Feb 12 20:35:09.195801 kubelet[2075]: E0212 20:35:09.195720 2075 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 12 20:35:09.197233 env[1153]: time="2024-02-12T20:35:09.197193670Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 20:35:09.278000 audit[2310]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.278000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6de6e140 a2=0 a3=7ffd6de6e12c items=0 ppid=2262 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:35:09.280000 audit[2311]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.280000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1ab58530 a2=0 a3=7fff1ab5851c items=0 ppid=2262 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.280000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:35:09.281000 audit[2312]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.281000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2330e7c0 a2=0 a3=7ffc2330e7ac items=0 ppid=2262 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.281000 audit[2313]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.281000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb1ff0660 a2=0 a3=7ffeb1ff064c items=0 ppid=2262 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:35:09.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:35:09.284000 audit[2314]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.284000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffef02fb50 a2=0 a3=7fffef02fb3c items=0 ppid=2262 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:35:09.286000 audit[2315]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.286000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe40230a0 a2=0 a3=7fffe402308c items=0 ppid=2262 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:35:09.387000 audit[2316]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.387000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd1be27c60 a2=0 a3=7ffd1be27c4c items=0 ppid=2262 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:35:09.392000 audit[2318]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.392000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd71a84a20 a2=0 a3=7ffd71a84a0c items=0 ppid=2262 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:35:09.398000 audit[2321]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.398000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffc8c900c0 a2=0 a3=7fffc8c900ac items=0 ppid=2262 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:35:09.400000 audit[2322]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.400000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda6a76ad0 a2=0 a3=7ffda6a76abc items=0 ppid=2262 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:35:09.403000 audit[2324]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.403000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb2c5edc0 a2=0 a3=7ffdb2c5edac items=0 ppid=2262 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:35:09.405000 audit[2325]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.405000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc42f2c2d0 a2=0 a3=7ffc42f2c2bc items=0 ppid=2262 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:35:09.410000 audit[2327]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.410000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc44b90bc0 a2=0 a3=7ffc44b90bac items=0 ppid=2262 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:35:09.416000 audit[2330]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.416000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcb5c3860 a2=0 a3=7fffcb5c384c items=0 ppid=2262 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.416000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:35:09.418000 audit[2331]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.418000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9a635e40 a2=0 a3=7fff9a635e2c items=0 ppid=2262 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:35:09.423000 audit[2333]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.423000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc72d62170 a2=0 a3=7ffc72d6215c items=0 ppid=2262 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:35:09.425000 audit[2334]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.425000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8700a380 a2=0 a3=7ffe8700a36c items=0 ppid=2262 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:35:09.428000 audit[2336]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.428000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe98558170 a2=0 a3=7ffe9855815c items=0 ppid=2262 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:35:09.434000 audit[2339]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.434000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5d9d3aa0 a2=0 a3=7ffe5d9d3a8c items=0 ppid=2262 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:35:09.441000 audit[2342]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.441000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc10b9aeb0 a2=0 a3=7ffc10b9ae9c items=0 ppid=2262 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:35:09.443000 audit[2343]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.443000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe905d3c70 a2=0 a3=7ffe905d3c5c items=0 ppid=2262 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:35:09.446000 audit[2345]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.446000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd75700760 a2=0 a3=7ffd7570074c items=0 ppid=2262 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:35:09.451000 audit[2348]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.451000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcafba5860 a2=0 a3=7ffcafba584c items=0 ppid=2262 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:35:09.462000 audit[2353]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.462000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8c55c650 a2=0 a3=7ffd8c55c63c items=0 ppid=2262 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:35:09.465000 audit[2355]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:35:09.465000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff6c3bccd0 a2=0 a3=7fff6c3bccbc items=0 ppid=2262 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:35:09.481000 audit[2357]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:09.481000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff0a5cf030 a2=0 a3=7fff0a5cf01c items=0 ppid=2262 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:09.493000 audit[2357]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:09.493000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff0a5cf030 a2=0 a3=7fff0a5cf01c items=0 ppid=2262 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:09.495000 audit[2363]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.495000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe778bbdf0 a2=0 a3=7ffe778bbddc items=0 ppid=2262 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:35:09.501000 audit[2365]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.501000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffed5844070 a2=0 a3=7ffed584405c items=0 ppid=2262 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:35:09.506000 audit[2368]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.506000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdfc8695f0 a2=0 a3=7ffdfc8695dc items=0 ppid=2262 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:35:09.508000 audit[2369]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.508000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed2417bb0 a2=0 a3=7ffed2417b9c items=0 ppid=2262 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:35:09.512000 audit[2371]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.512000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedc8a9380 a2=0 a3=7ffedc8a936c items=0 ppid=2262 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:35:09.514000 audit[2372]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.514000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd133bc910 a2=0 a3=7ffd133bc8fc items=0 ppid=2262 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:35:09.517000 audit[2374]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.517000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7af6a1d0 a2=0 a3=7ffd7af6a1bc items=0 ppid=2262 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.517000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:35:09.522000 audit[2377]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.522000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb44d4d40 a2=0 a3=7ffcb44d4d2c items=0 ppid=2262 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:35:09.524000 audit[2378]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.524000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcab33a170 a2=0 a3=7ffcab33a15c items=0 ppid=2262 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:35:09.527000 audit[2380]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.527000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9190c2c0 a2=0 a3=7ffe9190c2ac items=0 ppid=2262 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:35:09.529000 audit[2381]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.529000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5ebc6050 a2=0 a3=7ffc5ebc603c items=0 ppid=2262 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:35:09.532000 audit[2383]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.532000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1e20d140 a2=0 a3=7ffd1e20d12c items=0 ppid=2262 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:35:09.537000 audit[2386]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.537000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc78871990 a2=0 a3=7ffc7887197c items=0 ppid=2262 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:35:09.543000 audit[2389]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.543000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff59fd16b0 a2=0 a3=7fff59fd169c items=0 ppid=2262 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:35:09.546000 audit[2390]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.546000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffceac50310 a2=0 a3=7ffceac502fc items=0 ppid=2262 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:35:09.551000 audit[2392]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.551000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffbf524c90 a2=0 a3=7fffbf524c7c items=0 ppid=2262 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:35:09.557000 audit[2395]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.557000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc81e2a2c0 a2=0 a3=7ffc81e2a2ac items=0 ppid=2262 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:35:09.560000 audit[2396]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.560000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff7d186a0 a2=0 a3=7ffff7d1868c items=0 ppid=2262 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:35:09.564000 audit[2398]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.564000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcaa332840 a2=0 a3=7ffcaa33282c items=0 ppid=2262 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:35:09.569000 audit[2401]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.569000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc18371d30 a2=0 a3=7ffc18371d1c items=0 ppid=2262 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:35:09.571000 audit[2402]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.571000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbfe3f690 a2=0 a3=7ffdbfe3f67c items=0 ppid=2262 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:35:09.575000 audit[2404]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:35:09.575000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe701dc860 a2=0 a3=7ffe701dc84c items=0 ppid=2262 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:35:09.579000 audit[2406]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:35:09.579000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff5ca59ad0 a2=0 a3=7fff5ca59abc items=0 ppid=2262 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.579000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:09.580000 audit[2406]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:35:09.580000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff5ca59ad0 a2=0 a3=7fff5ca59abc items=0 ppid=2262 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:09.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:09.607810 kubelet[2075]: I0212 20:35:09.607363 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-4zgjb" podStartSLOduration=1.607297123 podCreationTimestamp="2024-02-12 20:35:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:35:09.606937668 +0000 UTC m=+16.364480562" watchObservedRunningTime="2024-02-12 20:35:09.607297123 +0000 UTC m=+16.364840017" Feb 12 20:35:09.693156 systemd[1]: run-containerd-runc-k8s.io-363bce20c29462348f6678f83de032b49bc7a657a75500078d1914d63a1331e4-runc.BJe45r.mount: Deactivated successfully. Feb 12 20:35:10.230435 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3009500700.mount: Deactivated successfully. Feb 12 20:35:11.332301 env[1153]: time="2024-02-12T20:35:11.332231465Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:11.334964 env[1153]: time="2024-02-12T20:35:11.334895207Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:11.340933 env[1153]: time="2024-02-12T20:35:11.340884889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:11.343362 env[1153]: time="2024-02-12T20:35:11.343312911Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:11.344318 env[1153]: time="2024-02-12T20:35:11.344267007Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 20:35:11.349753 env[1153]: time="2024-02-12T20:35:11.349706572Z" level=info msg="CreateContainer within sandbox \"758b1057dff815d7c94d39a28071ca8fe81185b81a88739e8183474fa7a8a928\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 20:35:11.366330 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3971781908.mount: Deactivated successfully. Feb 12 20:35:11.375109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3926058385.mount: Deactivated successfully. Feb 12 20:35:11.381156 env[1153]: time="2024-02-12T20:35:11.381102201Z" level=info msg="CreateContainer within sandbox \"758b1057dff815d7c94d39a28071ca8fe81185b81a88739e8183474fa7a8a928\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"85da000d4572534c0b46b17ec751ed92d39edfd20d55acb3800c5e6696e55a41\"" Feb 12 20:35:11.382987 env[1153]: time="2024-02-12T20:35:11.381694179Z" level=info msg="StartContainer for \"85da000d4572534c0b46b17ec751ed92d39edfd20d55acb3800c5e6696e55a41\"" Feb 12 20:35:11.407425 systemd[1]: Started cri-containerd-85da000d4572534c0b46b17ec751ed92d39edfd20d55acb3800c5e6696e55a41.scope. Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.427000 audit: BPF prog-id=123 op=LOAD Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2218 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:11.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646130303064343537323533346330623436623137656337353165 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2218 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:11.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646130303064343537323533346330623436623137656337353165 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit: BPF prog-id=124 op=LOAD Feb 12 20:35:11.428000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028a390 items=0 ppid=2218 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:11.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646130303064343537323533346330623436623137656337353165 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.428000 audit: BPF prog-id=125 op=LOAD Feb 12 20:35:11.428000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028a3d8 items=0 ppid=2218 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:11.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646130303064343537323533346330623436623137656337353165 Feb 12 20:35:11.428000 audit: BPF prog-id=125 op=UNLOAD Feb 12 20:35:11.428000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { perfmon } for pid=2414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit[2414]: AVC avc: denied { bpf } for pid=2414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:11.429000 audit: BPF prog-id=126 op=LOAD Feb 12 20:35:11.429000 audit[2414]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028a7e8 items=0 ppid=2218 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:11.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835646130303064343537323533346330623436623137656337353165 Feb 12 20:35:11.446697 env[1153]: time="2024-02-12T20:35:11.446577889Z" level=info msg="StartContainer for \"85da000d4572534c0b46b17ec751ed92d39edfd20d55acb3800c5e6696e55a41\" returns successfully" Feb 12 20:35:11.613640 kubelet[2075]: I0212 20:35:11.613497 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-qrggs" podStartSLOduration=1.458464789 podCreationTimestamp="2024-02-12 20:35:08 +0000 UTC" firstStartedPulling="2024-02-12 20:35:09.189782737 +0000 UTC m=+15.947325622" lastFinishedPulling="2024-02-12 20:35:11.344749554 +0000 UTC m=+18.102292427" observedRunningTime="2024-02-12 20:35:11.6125474 +0000 UTC m=+18.370090298" watchObservedRunningTime="2024-02-12 20:35:11.613431594 +0000 UTC m=+18.370974489" Feb 12 20:35:13.449000 audit[2446]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.455685 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 12 20:35:13.455822 kernel: audit: type=1325 audit(1707770113.449:1092): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.476523 kernel: audit: type=1300 audit(1707770113.449:1092): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe978d5d10 a2=0 a3=7ffe978d5cfc items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.449000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe978d5d10 a2=0 a3=7ffe978d5cfc items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.449000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.520606 kernel: audit: type=1327 audit(1707770113.449:1092): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.526000 audit[2446]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.526000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe978d5d10 a2=0 a3=31030 items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.575655 kernel: audit: type=1325 audit(1707770113.526:1093): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.575822 kernel: audit: type=1300 audit(1707770113.526:1093): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe978d5d10 a2=0 a3=31030 items=0 ppid=2262 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.593497 kernel: audit: type=1327 audit(1707770113.526:1093): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.642048 kubelet[2075]: I0212 20:35:13.642009 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:13.650861 systemd[1]: Created slice kubepods-besteffort-pod8713df7c_41db_4b7d_8049_853d8d348036.slice. Feb 12 20:35:13.728820 kubelet[2075]: I0212 20:35:13.727832 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/8713df7c-41db-4b7d-8049-853d8d348036-typha-certs\") pod \"calico-typha-77c9949c6-4jch6\" (UID: \"8713df7c-41db-4b7d-8049-853d8d348036\") " pod="calico-system/calico-typha-77c9949c6-4jch6" Feb 12 20:35:13.729091 kubelet[2075]: I0212 20:35:13.729066 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8713df7c-41db-4b7d-8049-853d8d348036-tigera-ca-bundle\") pod \"calico-typha-77c9949c6-4jch6\" (UID: \"8713df7c-41db-4b7d-8049-853d8d348036\") " pod="calico-system/calico-typha-77c9949c6-4jch6" Feb 12 20:35:13.729290 kubelet[2075]: I0212 20:35:13.729270 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtfbt\" (UniqueName: \"kubernetes.io/projected/8713df7c-41db-4b7d-8049-853d8d348036-kube-api-access-qtfbt\") pod \"calico-typha-77c9949c6-4jch6\" (UID: \"8713df7c-41db-4b7d-8049-853d8d348036\") " pod="calico-system/calico-typha-77c9949c6-4jch6" Feb 12 20:35:13.736000 audit[2450]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.753499 kernel: audit: type=1325 audit(1707770113.736:1094): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.736000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc4d7c05a0 a2=0 a3=7ffc4d7c058c items=0 ppid=2262 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.736000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.808500 kernel: audit: type=1300 audit(1707770113.736:1094): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffc4d7c05a0 a2=0 a3=7ffc4d7c058c items=0 ppid=2262 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.808655 kernel: audit: type=1327 audit(1707770113.736:1094): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.808708 kernel: audit: type=1325 audit(1707770113.736:1095): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.736000 audit[2450]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2450 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:13.736000 audit[2450]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffc4d7c05a0 a2=0 a3=31030 items=0 ppid=2262 pid=2450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:13.736000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:13.897119 kubelet[2075]: I0212 20:35:13.897064 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:13.905755 systemd[1]: Created slice kubepods-besteffort-poda52cddfa_68ba_4038_b004_93871e78e911.slice. Feb 12 20:35:13.954811 env[1153]: time="2024-02-12T20:35:13.954746336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77c9949c6-4jch6,Uid:8713df7c-41db-4b7d-8049-853d8d348036,Namespace:calico-system,Attempt:0,}" Feb 12 20:35:13.988645 env[1153]: time="2024-02-12T20:35:13.981702266Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:13.988645 env[1153]: time="2024-02-12T20:35:13.981749733Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:13.988645 env[1153]: time="2024-02-12T20:35:13.981768592Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:13.988645 env[1153]: time="2024-02-12T20:35:13.981955096Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ef8af6509b45c71416d0e8eb7e3aec3677307b69c5bdca8c2dc6c50af0b79301 pid=2460 runtime=io.containerd.runc.v2 Feb 12 20:35:14.040439 kubelet[2075]: I0212 20:35:14.040386 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-var-run-calico\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.040816 kubelet[2075]: I0212 20:35:14.040793 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a52cddfa-68ba-4038-b004-93871e78e911-tigera-ca-bundle\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.041065 kubelet[2075]: I0212 20:35:14.041020 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-cni-bin-dir\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.041319 kubelet[2075]: I0212 20:35:14.041302 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-flexvol-driver-host\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.041599 kubelet[2075]: I0212 20:35:14.041582 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-xtables-lock\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.041821 kubelet[2075]: I0212 20:35:14.041803 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-policysync\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.042060 kubelet[2075]: I0212 20:35:14.042043 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-cni-log-dir\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.042305 kubelet[2075]: I0212 20:35:14.042289 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hxq7k\" (UniqueName: \"kubernetes.io/projected/a52cddfa-68ba-4038-b004-93871e78e911-kube-api-access-hxq7k\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.042599 kubelet[2075]: I0212 20:35:14.042582 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-var-lib-calico\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.042850 kubelet[2075]: I0212 20:35:14.042834 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a52cddfa-68ba-4038-b004-93871e78e911-node-certs\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.043078 kubelet[2075]: I0212 20:35:14.043062 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-lib-modules\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.043299 kubelet[2075]: I0212 20:35:14.043282 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a52cddfa-68ba-4038-b004-93871e78e911-cni-net-dir\") pod \"calico-node-pv224\" (UID: \"a52cddfa-68ba-4038-b004-93871e78e911\") " pod="calico-system/calico-node-pv224" Feb 12 20:35:14.046455 systemd[1]: Started cri-containerd-ef8af6509b45c71416d0e8eb7e3aec3677307b69c5bdca8c2dc6c50af0b79301.scope. Feb 12 20:35:14.053749 kubelet[2075]: I0212 20:35:14.053703 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:14.054093 kubelet[2075]: E0212 20:35:14.054070 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.108000 audit: BPF prog-id=127 op=LOAD Feb 12 20:35:14.110000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.110000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2460 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386166363530396234356337313431366430653865623765336165 Feb 12 20:35:14.110000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.110000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2460 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386166363530396234356337313431366430653865623765336165 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.111000 audit: BPF prog-id=128 op=LOAD Feb 12 20:35:14.111000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000386d80 items=0 ppid=2460 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386166363530396234356337313431366430653865623765336165 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.112000 audit: BPF prog-id=129 op=LOAD Feb 12 20:35:14.112000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000386dc8 items=0 ppid=2460 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386166363530396234356337313431366430653865623765336165 Feb 12 20:35:14.115000 audit: BPF prog-id=129 op=UNLOAD Feb 12 20:35:14.116000 audit: BPF prog-id=128 op=UNLOAD Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.116000 audit: BPF prog-id=130 op=LOAD Feb 12 20:35:14.116000 audit[2470]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003871d8 items=0 ppid=2460 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566386166363530396234356337313431366430653865623765336165 Feb 12 20:35:14.145521 kubelet[2075]: I0212 20:35:14.144716 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/642c913b-5f51-4318-b6c2-348fa0c076e1-registration-dir\") pod \"csi-node-driver-tckwb\" (UID: \"642c913b-5f51-4318-b6c2-348fa0c076e1\") " pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:14.145521 kubelet[2075]: I0212 20:35:14.144799 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/642c913b-5f51-4318-b6c2-348fa0c076e1-varrun\") pod \"csi-node-driver-tckwb\" (UID: \"642c913b-5f51-4318-b6c2-348fa0c076e1\") " pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:14.145521 kubelet[2075]: I0212 20:35:14.144838 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/642c913b-5f51-4318-b6c2-348fa0c076e1-kubelet-dir\") pod \"csi-node-driver-tckwb\" (UID: \"642c913b-5f51-4318-b6c2-348fa0c076e1\") " pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:14.145521 kubelet[2075]: I0212 20:35:14.144876 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jm7lp\" (UniqueName: \"kubernetes.io/projected/642c913b-5f51-4318-b6c2-348fa0c076e1-kube-api-access-jm7lp\") pod \"csi-node-driver-tckwb\" (UID: \"642c913b-5f51-4318-b6c2-348fa0c076e1\") " pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:14.145521 kubelet[2075]: I0212 20:35:14.144992 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/642c913b-5f51-4318-b6c2-348fa0c076e1-socket-dir\") pod \"csi-node-driver-tckwb\" (UID: \"642c913b-5f51-4318-b6c2-348fa0c076e1\") " pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:14.147860 kubelet[2075]: E0212 20:35:14.147835 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.148068 kubelet[2075]: W0212 20:35:14.148043 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.148201 kubelet[2075]: E0212 20:35:14.148186 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.148655 kubelet[2075]: E0212 20:35:14.148635 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.148839 kubelet[2075]: W0212 20:35:14.148816 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.149017 kubelet[2075]: E0212 20:35:14.149001 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.149512 kubelet[2075]: E0212 20:35:14.149492 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.149667 kubelet[2075]: W0212 20:35:14.149647 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.149794 kubelet[2075]: E0212 20:35:14.149779 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.150233 kubelet[2075]: E0212 20:35:14.150214 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.150372 kubelet[2075]: W0212 20:35:14.150352 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.150540 kubelet[2075]: E0212 20:35:14.150523 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.152149 kubelet[2075]: E0212 20:35:14.150959 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.152149 kubelet[2075]: W0212 20:35:14.150976 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.152149 kubelet[2075]: E0212 20:35:14.151002 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.153195 kubelet[2075]: E0212 20:35:14.153146 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.153195 kubelet[2075]: W0212 20:35:14.153166 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.153363 kubelet[2075]: E0212 20:35:14.153305 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.153769 kubelet[2075]: E0212 20:35:14.153748 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.153769 kubelet[2075]: W0212 20:35:14.153765 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.153940 kubelet[2075]: E0212 20:35:14.153892 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.154155 kubelet[2075]: E0212 20:35:14.154136 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.154155 kubelet[2075]: W0212 20:35:14.154153 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.154316 kubelet[2075]: E0212 20:35:14.154275 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.154540 kubelet[2075]: E0212 20:35:14.154522 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.154540 kubelet[2075]: W0212 20:35:14.154537 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.154691 kubelet[2075]: E0212 20:35:14.154657 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.154916 kubelet[2075]: E0212 20:35:14.154886 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.154916 kubelet[2075]: W0212 20:35:14.154905 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.155074 kubelet[2075]: E0212 20:35:14.155029 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.155262 kubelet[2075]: E0212 20:35:14.155240 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.155344 kubelet[2075]: W0212 20:35:14.155266 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.155402 kubelet[2075]: E0212 20:35:14.155383 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.155654 kubelet[2075]: E0212 20:35:14.155634 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.155752 kubelet[2075]: W0212 20:35:14.155655 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.155825 kubelet[2075]: E0212 20:35:14.155783 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.156034 kubelet[2075]: E0212 20:35:14.156016 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.156034 kubelet[2075]: W0212 20:35:14.156033 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.156164 kubelet[2075]: E0212 20:35:14.156151 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.156374 kubelet[2075]: E0212 20:35:14.156356 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.156483 kubelet[2075]: W0212 20:35:14.156374 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.156572 kubelet[2075]: E0212 20:35:14.156509 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.156765 kubelet[2075]: E0212 20:35:14.156747 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.156765 kubelet[2075]: W0212 20:35:14.156764 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.156918 kubelet[2075]: E0212 20:35:14.156884 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.157099 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.158353 kubelet[2075]: W0212 20:35:14.157112 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.157234 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.157526 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.158353 kubelet[2075]: W0212 20:35:14.157537 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.157684 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.157917 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.158353 kubelet[2075]: W0212 20:35:14.157928 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.158037 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.158353 kubelet[2075]: E0212 20:35:14.158247 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.158961 kubelet[2075]: W0212 20:35:14.158257 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.158961 kubelet[2075]: E0212 20:35:14.158370 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.158961 kubelet[2075]: E0212 20:35:14.158617 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.158961 kubelet[2075]: W0212 20:35:14.158629 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.158961 kubelet[2075]: E0212 20:35:14.158763 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.159287 kubelet[2075]: E0212 20:35:14.159077 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.159287 kubelet[2075]: W0212 20:35:14.159089 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.159287 kubelet[2075]: E0212 20:35:14.159204 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.159456 kubelet[2075]: E0212 20:35:14.159433 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.159456 kubelet[2075]: W0212 20:35:14.159445 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.161354 kubelet[2075]: E0212 20:35:14.160229 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.166247 kubelet[2075]: E0212 20:35:14.166203 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.166247 kubelet[2075]: W0212 20:35:14.166222 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.166684 kubelet[2075]: E0212 20:35:14.166453 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.167654 kubelet[2075]: E0212 20:35:14.167621 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.167654 kubelet[2075]: W0212 20:35:14.167653 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.167931 kubelet[2075]: E0212 20:35:14.167842 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.171188 kubelet[2075]: E0212 20:35:14.171163 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.171324 kubelet[2075]: W0212 20:35:14.171185 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.171408 kubelet[2075]: E0212 20:35:14.171353 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.175948 kubelet[2075]: E0212 20:35:14.175918 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.175948 kubelet[2075]: W0212 20:35:14.175943 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.176093 kubelet[2075]: E0212 20:35:14.175974 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.176633 kubelet[2075]: E0212 20:35:14.176609 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.176633 kubelet[2075]: W0212 20:35:14.176631 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.176795 kubelet[2075]: E0212 20:35:14.176652 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.200316 kubelet[2075]: E0212 20:35:14.200112 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.200316 kubelet[2075]: W0212 20:35:14.200141 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.200316 kubelet[2075]: E0212 20:35:14.200171 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.214397 env[1153]: time="2024-02-12T20:35:14.214340474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pv224,Uid:a52cddfa-68ba-4038-b004-93871e78e911,Namespace:calico-system,Attempt:0,}" Feb 12 20:35:14.219879 env[1153]: time="2024-02-12T20:35:14.219701664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-77c9949c6-4jch6,Uid:8713df7c-41db-4b7d-8049-853d8d348036,Namespace:calico-system,Attempt:0,} returns sandbox id \"ef8af6509b45c71416d0e8eb7e3aec3677307b69c5bdca8c2dc6c50af0b79301\"" Feb 12 20:35:14.224576 env[1153]: time="2024-02-12T20:35:14.224535386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 20:35:14.245632 env[1153]: time="2024-02-12T20:35:14.245407578Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:14.245847 env[1153]: time="2024-02-12T20:35:14.245495037Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:14.246030 env[1153]: time="2024-02-12T20:35:14.245984463Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:14.246826 kubelet[2075]: E0212 20:35:14.246627 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.246826 kubelet[2075]: W0212 20:35:14.246648 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.246826 kubelet[2075]: E0212 20:35:14.246678 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.253800 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.255150 kubelet[2075]: W0212 20:35:14.253822 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.253856 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.254265 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.255150 kubelet[2075]: W0212 20:35:14.254279 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.254310 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.254661 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.255150 kubelet[2075]: W0212 20:35:14.254674 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.254698 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.255150 kubelet[2075]: E0212 20:35:14.255035 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.255745 kubelet[2075]: W0212 20:35:14.255049 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.256297 kubelet[2075]: E0212 20:35:14.255846 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.256297 kubelet[2075]: E0212 20:35:14.256114 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.256297 kubelet[2075]: W0212 20:35:14.256128 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.256297 kubelet[2075]: E0212 20:35:14.256248 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.256925 kubelet[2075]: E0212 20:35:14.256785 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.256925 kubelet[2075]: W0212 20:35:14.256802 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.257156 kubelet[2075]: E0212 20:35:14.257115 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.257308 kubelet[2075]: E0212 20:35:14.257295 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.257541 kubelet[2075]: W0212 20:35:14.257400 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.257686 kubelet[2075]: E0212 20:35:14.257668 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.257867 kubelet[2075]: E0212 20:35:14.257852 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.258111 kubelet[2075]: W0212 20:35:14.257977 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.258247 kubelet[2075]: E0212 20:35:14.258231 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.258426 kubelet[2075]: E0212 20:35:14.258412 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.258563 kubelet[2075]: W0212 20:35:14.258545 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.258805 kubelet[2075]: E0212 20:35:14.258786 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.259023 kubelet[2075]: E0212 20:35:14.259006 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.259153 kubelet[2075]: W0212 20:35:14.259134 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.259388 kubelet[2075]: E0212 20:35:14.259372 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.259741 kubelet[2075]: E0212 20:35:14.259725 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.259872 kubelet[2075]: W0212 20:35:14.259855 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.260112 kubelet[2075]: E0212 20:35:14.260092 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.260289 kubelet[2075]: E0212 20:35:14.260275 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.260407 kubelet[2075]: W0212 20:35:14.260390 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.260665 kubelet[2075]: E0212 20:35:14.260647 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.260855 kubelet[2075]: E0212 20:35:14.260841 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.261023 env[1153]: time="2024-02-12T20:35:14.253885975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479 pid=2529 runtime=io.containerd.runc.v2 Feb 12 20:35:14.266569 kubelet[2075]: W0212 20:35:14.266544 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.266881 kubelet[2075]: E0212 20:35:14.266848 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.267004 kubelet[2075]: E0212 20:35:14.266990 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.267078 kubelet[2075]: W0212 20:35:14.267003 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.267143 kubelet[2075]: E0212 20:35:14.267112 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.267311 kubelet[2075]: E0212 20:35:14.267295 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.267311 kubelet[2075]: W0212 20:35:14.267309 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.267602 kubelet[2075]: E0212 20:35:14.267421 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.267718 kubelet[2075]: E0212 20:35:14.267647 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.267718 kubelet[2075]: W0212 20:35:14.267660 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.267978 kubelet[2075]: E0212 20:35:14.267768 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.267978 kubelet[2075]: E0212 20:35:14.267963 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.267978 kubelet[2075]: W0212 20:35:14.267974 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.268332 kubelet[2075]: E0212 20:35:14.268084 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.268332 kubelet[2075]: E0212 20:35:14.268274 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.268332 kubelet[2075]: W0212 20:35:14.268286 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.268990 kubelet[2075]: E0212 20:35:14.268394 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.268990 kubelet[2075]: E0212 20:35:14.268614 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.268990 kubelet[2075]: W0212 20:35:14.268639 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.268990 kubelet[2075]: E0212 20:35:14.268683 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.268990 kubelet[2075]: E0212 20:35:14.268946 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.268990 kubelet[2075]: W0212 20:35:14.268958 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.269834 kubelet[2075]: E0212 20:35:14.269093 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.269834 kubelet[2075]: E0212 20:35:14.269290 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.269834 kubelet[2075]: W0212 20:35:14.269302 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.269834 kubelet[2075]: E0212 20:35:14.269439 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.270372 kubelet[2075]: E0212 20:35:14.269877 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.270372 kubelet[2075]: W0212 20:35:14.269890 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.270372 kubelet[2075]: E0212 20:35:14.270012 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.270372 kubelet[2075]: E0212 20:35:14.270197 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.270372 kubelet[2075]: W0212 20:35:14.270210 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.270372 kubelet[2075]: E0212 20:35:14.270341 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.270978 kubelet[2075]: E0212 20:35:14.270578 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.270978 kubelet[2075]: W0212 20:35:14.270591 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.270978 kubelet[2075]: E0212 20:35:14.270611 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.284296 systemd[1]: Started cri-containerd-249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479.scope. Feb 12 20:35:14.307360 kubelet[2075]: E0212 20:35:14.307319 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:14.307360 kubelet[2075]: W0212 20:35:14.307356 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:14.307656 kubelet[2075]: E0212 20:35:14.307407 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.319000 audit: BPF prog-id=131 op=LOAD Feb 12 20:35:14.321000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.321000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2529 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234396334653930646139333863363265346663343836376434633833 Feb 12 20:35:14.321000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.321000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2529 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234396334653930646139333863363265346663343836376434633833 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.322000 audit: BPF prog-id=132 op=LOAD Feb 12 20:35:14.322000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003546e0 items=0 ppid=2529 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234396334653930646139333863363265346663343836376434633833 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.323000 audit: BPF prog-id=133 op=LOAD Feb 12 20:35:14.323000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000354728 items=0 ppid=2529 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234396334653930646139333863363265346663343836376434633833 Feb 12 20:35:14.324000 audit: BPF prog-id=133 op=UNLOAD Feb 12 20:35:14.324000 audit: BPF prog-id=132 op=UNLOAD Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { perfmon } for pid=2549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit[2549]: AVC avc: denied { bpf } for pid=2549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:14.324000 audit: BPF prog-id=134 op=LOAD Feb 12 20:35:14.324000 audit[2549]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354b38 items=0 ppid=2529 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234396334653930646139333863363265346663343836376434633833 Feb 12 20:35:14.350402 env[1153]: time="2024-02-12T20:35:14.350346678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pv224,Uid:a52cddfa-68ba-4038-b004-93871e78e911,Namespace:calico-system,Attempt:0,} returns sandbox id \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\"" Feb 12 20:35:14.778000 audit[2592]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:14.778000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe36dcddb0 a2=0 a3=7ffe36dcdd9c items=0 ppid=2262 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:14.782000 audit[2592]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2592 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:14.782000 audit[2592]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffe36dcddb0 a2=0 a3=31030 items=0 ppid=2262 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:14.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:14.848883 systemd[1]: run-containerd-runc-k8s.io-ef8af6509b45c71416d0e8eb7e3aec3677307b69c5bdca8c2dc6c50af0b79301-runc.i7pAnf.mount: Deactivated successfully. Feb 12 20:35:15.348690 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2036597974.mount: Deactivated successfully. Feb 12 20:35:15.497734 kubelet[2075]: E0212 20:35:15.497681 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:17.039630 env[1153]: time="2024-02-12T20:35:17.039570283Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:17.043277 env[1153]: time="2024-02-12T20:35:17.043236252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:17.048074 env[1153]: time="2024-02-12T20:35:17.048038019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:17.051636 env[1153]: time="2024-02-12T20:35:17.051591840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:17.053271 env[1153]: time="2024-02-12T20:35:17.053237006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 20:35:17.056189 env[1153]: time="2024-02-12T20:35:17.055747834Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:35:17.084215 env[1153]: time="2024-02-12T20:35:17.084175627Z" level=info msg="CreateContainer within sandbox \"ef8af6509b45c71416d0e8eb7e3aec3677307b69c5bdca8c2dc6c50af0b79301\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:35:17.105865 env[1153]: time="2024-02-12T20:35:17.105808912Z" level=info msg="CreateContainer within sandbox \"ef8af6509b45c71416d0e8eb7e3aec3677307b69c5bdca8c2dc6c50af0b79301\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"fa8d59c634a77edfe2a22dfad17b1f4642004456219dc55705a447b40bb94349\"" Feb 12 20:35:17.107223 env[1153]: time="2024-02-12T20:35:17.107165065Z" level=info msg="StartContainer for \"fa8d59c634a77edfe2a22dfad17b1f4642004456219dc55705a447b40bb94349\"" Feb 12 20:35:17.146882 systemd[1]: Started cri-containerd-fa8d59c634a77edfe2a22dfad17b1f4642004456219dc55705a447b40bb94349.scope. Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.190000 audit: BPF prog-id=135 op=LOAD Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2460 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386435396336333461373765646665326132326466616431376231 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2460 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386435396336333461373765646665326132326466616431376231 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit: BPF prog-id=136 op=LOAD Feb 12 20:35:17.191000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d9d10 items=0 ppid=2460 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386435396336333461373765646665326132326466616431376231 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit: BPF prog-id=137 op=LOAD Feb 12 20:35:17.191000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d9d58 items=0 ppid=2460 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386435396336333461373765646665326132326466616431376231 Feb 12 20:35:17.191000 audit: BPF prog-id=137 op=UNLOAD Feb 12 20:35:17.191000 audit: BPF prog-id=136 op=UNLOAD Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { perfmon } for pid=2603 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit[2603]: AVC avc: denied { bpf } for pid=2603 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:17.191000 audit: BPF prog-id=138 op=LOAD Feb 12 20:35:17.191000 audit[2603]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000340168 items=0 ppid=2460 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661386435396336333461373765646665326132326466616431376231 Feb 12 20:35:17.243081 env[1153]: time="2024-02-12T20:35:17.243019382Z" level=info msg="StartContainer for \"fa8d59c634a77edfe2a22dfad17b1f4642004456219dc55705a447b40bb94349\" returns successfully" Feb 12 20:35:17.497908 kubelet[2075]: E0212 20:35:17.495789 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:17.635799 kubelet[2075]: I0212 20:35:17.635742 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-77c9949c6-4jch6" podStartSLOduration=1.8025871100000002 podCreationTimestamp="2024-02-12 20:35:13 +0000 UTC" firstStartedPulling="2024-02-12 20:35:14.221655762 +0000 UTC m=+20.979198630" lastFinishedPulling="2024-02-12 20:35:17.054777466 +0000 UTC m=+23.812320349" observedRunningTime="2024-02-12 20:35:17.634292649 +0000 UTC m=+24.391835542" watchObservedRunningTime="2024-02-12 20:35:17.635708829 +0000 UTC m=+24.393251720" Feb 12 20:35:17.715252 kubelet[2075]: E0212 20:35:17.715216 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.715252 kubelet[2075]: W0212 20:35:17.715243 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.715559 kubelet[2075]: E0212 20:35:17.715271 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.715637 kubelet[2075]: E0212 20:35:17.715586 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.715637 kubelet[2075]: W0212 20:35:17.715600 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.715637 kubelet[2075]: E0212 20:35:17.715622 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.715900 kubelet[2075]: E0212 20:35:17.715881 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.715900 kubelet[2075]: W0212 20:35:17.715896 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.716049 kubelet[2075]: E0212 20:35:17.715916 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.716264 kubelet[2075]: E0212 20:35:17.716242 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.716264 kubelet[2075]: W0212 20:35:17.716260 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.716406 kubelet[2075]: E0212 20:35:17.716279 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.716702 kubelet[2075]: E0212 20:35:17.716659 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.716702 kubelet[2075]: W0212 20:35:17.716701 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.716901 kubelet[2075]: E0212 20:35:17.716722 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.717029 kubelet[2075]: E0212 20:35:17.717011 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.717029 kubelet[2075]: W0212 20:35:17.717027 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.717174 kubelet[2075]: E0212 20:35:17.717049 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.717411 kubelet[2075]: E0212 20:35:17.717391 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.717411 kubelet[2075]: W0212 20:35:17.717408 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.717601 kubelet[2075]: E0212 20:35:17.717431 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.717868 kubelet[2075]: E0212 20:35:17.717847 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.717868 kubelet[2075]: W0212 20:35:17.717866 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.718039 kubelet[2075]: E0212 20:35:17.717886 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.718233 kubelet[2075]: E0212 20:35:17.718201 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.718233 kubelet[2075]: W0212 20:35:17.718219 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.718407 kubelet[2075]: E0212 20:35:17.718240 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.718777 kubelet[2075]: E0212 20:35:17.718754 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.718870 kubelet[2075]: W0212 20:35:17.718784 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.718870 kubelet[2075]: E0212 20:35:17.718805 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.719194 kubelet[2075]: E0212 20:35:17.719175 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.719284 kubelet[2075]: W0212 20:35:17.719201 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.719284 kubelet[2075]: E0212 20:35:17.719221 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.719696 kubelet[2075]: E0212 20:35:17.719663 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.719696 kubelet[2075]: W0212 20:35:17.719695 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.719846 kubelet[2075]: E0212 20:35:17.719714 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.780313 kubelet[2075]: E0212 20:35:17.780270 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.780313 kubelet[2075]: W0212 20:35:17.780296 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.780604 kubelet[2075]: E0212 20:35:17.780324 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.780933 kubelet[2075]: E0212 20:35:17.780912 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.781032 kubelet[2075]: W0212 20:35:17.780934 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.781032 kubelet[2075]: E0212 20:35:17.780970 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.781385 kubelet[2075]: E0212 20:35:17.781365 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.781385 kubelet[2075]: W0212 20:35:17.781382 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.781544 kubelet[2075]: E0212 20:35:17.781408 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.781837 kubelet[2075]: E0212 20:35:17.781818 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.781837 kubelet[2075]: W0212 20:35:17.781835 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.781974 kubelet[2075]: E0212 20:35:17.781861 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.782257 kubelet[2075]: E0212 20:35:17.782230 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.782257 kubelet[2075]: W0212 20:35:17.782256 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.782400 kubelet[2075]: E0212 20:35:17.782388 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.782720 kubelet[2075]: E0212 20:35:17.782701 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.782720 kubelet[2075]: W0212 20:35:17.782717 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.782868 kubelet[2075]: E0212 20:35:17.782817 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.783201 kubelet[2075]: E0212 20:35:17.783161 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.783201 kubelet[2075]: W0212 20:35:17.783182 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.783341 kubelet[2075]: E0212 20:35:17.783280 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.783682 kubelet[2075]: E0212 20:35:17.783664 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.783682 kubelet[2075]: W0212 20:35:17.783680 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.783819 kubelet[2075]: E0212 20:35:17.783716 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.784093 kubelet[2075]: E0212 20:35:17.784073 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.784093 kubelet[2075]: W0212 20:35:17.784093 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.784256 kubelet[2075]: E0212 20:35:17.784128 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.784930 kubelet[2075]: E0212 20:35:17.784909 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.784930 kubelet[2075]: W0212 20:35:17.784926 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.785092 kubelet[2075]: E0212 20:35:17.784956 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.785387 kubelet[2075]: E0212 20:35:17.785367 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.785387 kubelet[2075]: W0212 20:35:17.785383 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.785567 kubelet[2075]: E0212 20:35:17.785535 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.785839 kubelet[2075]: E0212 20:35:17.785821 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.785839 kubelet[2075]: W0212 20:35:17.785837 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.785993 kubelet[2075]: E0212 20:35:17.785960 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.786251 kubelet[2075]: E0212 20:35:17.786233 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.786251 kubelet[2075]: W0212 20:35:17.786249 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.786394 kubelet[2075]: E0212 20:35:17.786365 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.786760 kubelet[2075]: E0212 20:35:17.786739 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.786760 kubelet[2075]: W0212 20:35:17.786756 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.786940 kubelet[2075]: E0212 20:35:17.786781 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.787440 kubelet[2075]: E0212 20:35:17.787419 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.787440 kubelet[2075]: W0212 20:35:17.787436 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.787676 kubelet[2075]: E0212 20:35:17.787462 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.787965 kubelet[2075]: E0212 20:35:17.787947 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.787965 kubelet[2075]: W0212 20:35:17.787963 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.788116 kubelet[2075]: E0212 20:35:17.787988 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.788550 kubelet[2075]: E0212 20:35:17.788530 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.788550 kubelet[2075]: W0212 20:35:17.788548 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.788774 kubelet[2075]: E0212 20:35:17.788737 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:17.788973 kubelet[2075]: E0212 20:35:17.788956 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:17.788973 kubelet[2075]: W0212 20:35:17.788972 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:17.789106 kubelet[2075]: E0212 20:35:17.788993 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.622923 kubelet[2075]: I0212 20:35:18.622865 2075 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:35:18.624571 kubelet[2075]: E0212 20:35:18.624531 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.624741 kubelet[2075]: W0212 20:35:18.624576 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.624741 kubelet[2075]: E0212 20:35:18.624604 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.624976 kubelet[2075]: E0212 20:35:18.624953 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.625065 kubelet[2075]: W0212 20:35:18.625030 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.625065 kubelet[2075]: E0212 20:35:18.625055 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.625443 kubelet[2075]: E0212 20:35:18.625418 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.625569 kubelet[2075]: W0212 20:35:18.625448 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.625569 kubelet[2075]: E0212 20:35:18.625483 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.625856 kubelet[2075]: E0212 20:35:18.625833 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.625856 kubelet[2075]: W0212 20:35:18.625853 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.626002 kubelet[2075]: E0212 20:35:18.625883 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.626230 kubelet[2075]: E0212 20:35:18.626209 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.626230 kubelet[2075]: W0212 20:35:18.626229 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.626380 kubelet[2075]: E0212 20:35:18.626248 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.626721 kubelet[2075]: E0212 20:35:18.626694 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.626721 kubelet[2075]: W0212 20:35:18.626715 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.626880 kubelet[2075]: E0212 20:35:18.626736 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.627138 kubelet[2075]: E0212 20:35:18.627114 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.627223 kubelet[2075]: W0212 20:35:18.627185 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.627223 kubelet[2075]: E0212 20:35:18.627215 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.627559 kubelet[2075]: E0212 20:35:18.627537 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.627648 kubelet[2075]: W0212 20:35:18.627567 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.627648 kubelet[2075]: E0212 20:35:18.627586 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.627913 kubelet[2075]: E0212 20:35:18.627881 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.627913 kubelet[2075]: W0212 20:35:18.627901 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.628072 kubelet[2075]: E0212 20:35:18.627921 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.628260 kubelet[2075]: E0212 20:35:18.628237 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.628260 kubelet[2075]: W0212 20:35:18.628257 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.628413 kubelet[2075]: E0212 20:35:18.628276 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.628626 kubelet[2075]: E0212 20:35:18.628605 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.628756 kubelet[2075]: W0212 20:35:18.628633 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.628756 kubelet[2075]: E0212 20:35:18.628652 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.628974 kubelet[2075]: E0212 20:35:18.628953 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.629049 kubelet[2075]: W0212 20:35:18.628973 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.629049 kubelet[2075]: E0212 20:35:18.628992 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.687043 kubelet[2075]: E0212 20:35:18.687005 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.687043 kubelet[2075]: W0212 20:35:18.687034 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.687322 kubelet[2075]: E0212 20:35:18.687064 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.687516 kubelet[2075]: E0212 20:35:18.687494 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.687516 kubelet[2075]: W0212 20:35:18.687514 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.687683 kubelet[2075]: E0212 20:35:18.687540 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.687939 kubelet[2075]: E0212 20:35:18.687915 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.688045 kubelet[2075]: W0212 20:35:18.687935 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.688045 kubelet[2075]: E0212 20:35:18.687975 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.688343 kubelet[2075]: E0212 20:35:18.688323 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.688343 kubelet[2075]: W0212 20:35:18.688341 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.688499 kubelet[2075]: E0212 20:35:18.688366 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.688724 kubelet[2075]: E0212 20:35:18.688704 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.688724 kubelet[2075]: W0212 20:35:18.688722 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.688887 kubelet[2075]: E0212 20:35:18.688843 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.689067 kubelet[2075]: E0212 20:35:18.689049 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.689067 kubelet[2075]: W0212 20:35:18.689066 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.689191 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.689414 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.690495 kubelet[2075]: W0212 20:35:18.689424 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.689547 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.689743 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.690495 kubelet[2075]: W0212 20:35:18.689752 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.689781 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.690074 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.690495 kubelet[2075]: W0212 20:35:18.690084 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.690495 kubelet[2075]: E0212 20:35:18.690103 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.691112 kubelet[2075]: E0212 20:35:18.690605 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.691112 kubelet[2075]: W0212 20:35:18.690618 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.691112 kubelet[2075]: E0212 20:35:18.690744 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.691112 kubelet[2075]: E0212 20:35:18.690966 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.691112 kubelet[2075]: W0212 20:35:18.690977 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.691112 kubelet[2075]: E0212 20:35:18.691093 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.691436 kubelet[2075]: E0212 20:35:18.691320 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.691436 kubelet[2075]: W0212 20:35:18.691332 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.691436 kubelet[2075]: E0212 20:35:18.691354 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.691753 kubelet[2075]: E0212 20:35:18.691733 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.691753 kubelet[2075]: W0212 20:35:18.691751 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.691887 kubelet[2075]: E0212 20:35:18.691775 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.692128 kubelet[2075]: E0212 20:35:18.692101 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.692128 kubelet[2075]: W0212 20:35:18.692126 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.692260 kubelet[2075]: E0212 20:35:18.692149 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.692712 kubelet[2075]: E0212 20:35:18.692692 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.692874 kubelet[2075]: W0212 20:35:18.692711 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.692940 kubelet[2075]: E0212 20:35:18.692907 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.693151 kubelet[2075]: E0212 20:35:18.693130 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.693151 kubelet[2075]: W0212 20:35:18.693148 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.693283 kubelet[2075]: E0212 20:35:18.693166 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.693617 kubelet[2075]: E0212 20:35:18.693564 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.693617 kubelet[2075]: W0212 20:35:18.693610 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.693784 kubelet[2075]: E0212 20:35:18.693634 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:18.695290 kubelet[2075]: E0212 20:35:18.694606 2075 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:35:18.695290 kubelet[2075]: W0212 20:35:18.694623 2075 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:35:18.695290 kubelet[2075]: E0212 20:35:18.694668 2075 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:35:19.057919 env[1153]: time="2024-02-12T20:35:19.057879964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:19.060641 env[1153]: time="2024-02-12T20:35:19.060604418Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:19.064915 env[1153]: time="2024-02-12T20:35:19.063548125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:19.067020 env[1153]: time="2024-02-12T20:35:19.066986621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:19.068389 env[1153]: time="2024-02-12T20:35:19.068344664Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:35:19.076902 env[1153]: time="2024-02-12T20:35:19.076851291Z" level=info msg="CreateContainer within sandbox \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:35:19.097861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1354545791.mount: Deactivated successfully. Feb 12 20:35:19.103602 env[1153]: time="2024-02-12T20:35:19.103551318Z" level=info msg="CreateContainer within sandbox \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44\"" Feb 12 20:35:19.105491 env[1153]: time="2024-02-12T20:35:19.104945978Z" level=info msg="StartContainer for \"436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44\"" Feb 12 20:35:19.140579 systemd[1]: Started cri-containerd-436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44.scope. Feb 12 20:35:19.156678 systemd[1]: run-containerd-runc-k8s.io-436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44-runc.HicWhw.mount: Deactivated successfully. Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.192239 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 20:35:19.192360 kernel: audit: type=1400 audit(1707770119.185:1152): avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fef788072e8 items=0 ppid=2529 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:19.245766 kernel: audit: type=1300 audit(1707770119.185:1152): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fef788072e8 items=0 ppid=2529 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:19.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366634653936663931336466633938663738373763356636343834 Feb 12 20:35:19.279676 kernel: audit: type=1327 audit(1707770119.185:1152): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366634653936663931336466633938663738373763356636343834 Feb 12 20:35:19.300790 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.300868 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.291742 systemd[1]: cri-containerd-436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44.scope: Deactivated successfully. Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.341931 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.342075 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.342639 env[1153]: time="2024-02-12T20:35:19.342585256Z" level=info msg="StartContainer for \"436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44\" returns successfully" Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.383802 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.405080 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.426158 kernel: audit: type=1400 audit(1707770119.185:1153): avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit: BPF prog-id=139 op=LOAD Feb 12 20:35:19.185000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002fe108 items=0 ppid=2529 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:19.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366634653936663931336466633938663738373763356636343834 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.185000 audit: BPF prog-id=140 op=LOAD Feb 12 20:35:19.185000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002fe158 items=0 ppid=2529 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:19.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366634653936663931336466633938663738373763356636343834 Feb 12 20:35:19.186000 audit: BPF prog-id=140 op=UNLOAD Feb 12 20:35:19.186000 audit: BPF prog-id=139 op=UNLOAD Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:19.186000 audit: BPF prog-id=141 op=LOAD Feb 12 20:35:19.186000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002fe1e8 items=0 ppid=2529 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:19.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433366634653936663931336466633938663738373763356636343834 Feb 12 20:35:19.300000 audit: BPF prog-id=141 op=UNLOAD Feb 12 20:35:19.497155 kubelet[2075]: E0212 20:35:19.497100 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:19.959926 env[1153]: time="2024-02-12T20:35:19.959825315Z" level=info msg="shim disconnected" id=436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44 Feb 12 20:35:19.959926 env[1153]: time="2024-02-12T20:35:19.959914345Z" level=warning msg="cleaning up after shim disconnected" id=436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44 namespace=k8s.io Feb 12 20:35:19.960233 env[1153]: time="2024-02-12T20:35:19.959931990Z" level=info msg="cleaning up dead shim" Feb 12 20:35:19.970712 env[1153]: time="2024-02-12T20:35:19.970650197Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:35:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2748 runtime=io.containerd.runc.v2\n" Feb 12 20:35:20.092538 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-436f4e96f913dfc98f7877c5f6484ba9f4dd7a748ee0b5fcc1694985298b2f44-rootfs.mount: Deactivated successfully. Feb 12 20:35:20.632517 env[1153]: time="2024-02-12T20:35:20.631589807Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:35:21.496507 kubelet[2075]: E0212 20:35:21.495887 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:21.569791 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount944630395.mount: Deactivated successfully. Feb 12 20:35:23.496296 kubelet[2075]: E0212 20:35:23.496251 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:25.445373 env[1153]: time="2024-02-12T20:35:25.445300534Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:25.448384 env[1153]: time="2024-02-12T20:35:25.448335086Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:25.451013 env[1153]: time="2024-02-12T20:35:25.450972520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:25.453350 env[1153]: time="2024-02-12T20:35:25.453311687Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:25.454316 env[1153]: time="2024-02-12T20:35:25.454258961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:35:25.459235 env[1153]: time="2024-02-12T20:35:25.458956338Z" level=info msg="CreateContainer within sandbox \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:35:25.481640 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount781112390.mount: Deactivated successfully. Feb 12 20:35:25.487191 env[1153]: time="2024-02-12T20:35:25.487135307Z" level=info msg="CreateContainer within sandbox \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2\"" Feb 12 20:35:25.496705 env[1153]: time="2024-02-12T20:35:25.496663144Z" level=info msg="StartContainer for \"c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2\"" Feb 12 20:35:25.499818 kubelet[2075]: E0212 20:35:25.499788 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:25.532587 systemd[1]: Started cri-containerd-c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2.scope. Feb 12 20:35:25.544493 systemd[1]: run-containerd-runc-k8s.io-c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2-runc.pJjOrF.mount: Deactivated successfully. Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.574614 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:35:25.574722 kernel: audit: type=1400 audit(1707770125.567:1159): avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f2b184847c8 items=0 ppid=2529 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:25.630591 kernel: audit: type=1300 audit(1707770125.567:1159): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f2b184847c8 items=0 ppid=2529 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:25.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616531663362383236316636373838646236383030393534316430 Feb 12 20:35:25.662490 kernel: audit: type=1327 audit(1707770125.567:1159): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616531663362383236316636373838646236383030393534316430 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.704352 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.704542 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.706315 env[1153]: time="2024-02-12T20:35:25.706252658Z" level=info msg="StartContainer for \"c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2\" returns successfully" Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.741599 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.764556 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.807074 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.807234 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.807283 kernel: audit: type=1400 audit(1707770125.567:1160): avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.567000 audit: BPF prog-id=142 op=LOAD Feb 12 20:35:25.567000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b0398 items=0 ppid=2529 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:25.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616531663362383236316636373838646236383030393534316430 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit: BPF prog-id=143 op=LOAD Feb 12 20:35:25.594000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003b03e8 items=0 ppid=2529 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:25.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616531663362383236316636373838646236383030393534316430 Feb 12 20:35:25.594000 audit: BPF prog-id=143 op=UNLOAD Feb 12 20:35:25.594000 audit: BPF prog-id=142 op=UNLOAD Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:25.594000 audit: BPF prog-id=144 op=LOAD Feb 12 20:35:25.594000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003b0478 items=0 ppid=2529 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:25.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616531663362383236316636373838646236383030393534316430 Feb 12 20:35:26.547848 env[1153]: time="2024-02-12T20:35:26.547767600Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:35:26.551633 systemd[1]: cri-containerd-c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2.scope: Deactivated successfully. Feb 12 20:35:26.556000 audit: BPF prog-id=144 op=UNLOAD Feb 12 20:35:26.581944 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2-rootfs.mount: Deactivated successfully. Feb 12 20:35:26.620371 kubelet[2075]: I0212 20:35:26.620331 2075 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:35:26.647754 kubelet[2075]: I0212 20:35:26.647706 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:26.655556 systemd[1]: Created slice kubepods-burstable-pod475c46cb_68e0_4e36_bf9a_87e71fb55867.slice. Feb 12 20:35:26.661954 kubelet[2075]: I0212 20:35:26.661916 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:26.664271 kubelet[2075]: I0212 20:35:26.664241 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:35:26.670985 systemd[1]: Created slice kubepods-burstable-pod8a07d73f_80b6_4aa5_b973_9aa8bb72a760.slice. Feb 12 20:35:26.678888 systemd[1]: Created slice kubepods-besteffort-podcc9151b7_617f_4846_a392_b04f10598ee4.slice. Feb 12 20:35:26.792418 kubelet[2075]: I0212 20:35:26.792368 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/475c46cb-68e0-4e36-bf9a-87e71fb55867-config-volume\") pod \"coredns-5d78c9869d-bh5kd\" (UID: \"475c46cb-68e0-4e36-bf9a-87e71fb55867\") " pod="kube-system/coredns-5d78c9869d-bh5kd" Feb 12 20:35:26.792885 kubelet[2075]: I0212 20:35:26.792863 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wvjt6\" (UniqueName: \"kubernetes.io/projected/475c46cb-68e0-4e36-bf9a-87e71fb55867-kube-api-access-wvjt6\") pod \"coredns-5d78c9869d-bh5kd\" (UID: \"475c46cb-68e0-4e36-bf9a-87e71fb55867\") " pod="kube-system/coredns-5d78c9869d-bh5kd" Feb 12 20:35:26.793048 kubelet[2075]: I0212 20:35:26.793032 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gbh96\" (UniqueName: \"kubernetes.io/projected/8a07d73f-80b6-4aa5-b973-9aa8bb72a760-kube-api-access-gbh96\") pod \"coredns-5d78c9869d-5t4z6\" (UID: \"8a07d73f-80b6-4aa5-b973-9aa8bb72a760\") " pod="kube-system/coredns-5d78c9869d-5t4z6" Feb 12 20:35:26.793200 kubelet[2075]: I0212 20:35:26.793185 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc9151b7-617f-4846-a392-b04f10598ee4-tigera-ca-bundle\") pod \"calico-kube-controllers-58689989f6-kzbtg\" (UID: \"cc9151b7-617f-4846-a392-b04f10598ee4\") " pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" Feb 12 20:35:26.793335 kubelet[2075]: I0212 20:35:26.793321 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8a07d73f-80b6-4aa5-b973-9aa8bb72a760-config-volume\") pod \"coredns-5d78c9869d-5t4z6\" (UID: \"8a07d73f-80b6-4aa5-b973-9aa8bb72a760\") " pod="kube-system/coredns-5d78c9869d-5t4z6" Feb 12 20:35:26.793509 kubelet[2075]: I0212 20:35:26.793494 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dl7bm\" (UniqueName: \"kubernetes.io/projected/cc9151b7-617f-4846-a392-b04f10598ee4-kube-api-access-dl7bm\") pod \"calico-kube-controllers-58689989f6-kzbtg\" (UID: \"cc9151b7-617f-4846-a392-b04f10598ee4\") " pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" Feb 12 20:35:26.962282 env[1153]: time="2024-02-12T20:35:26.961533763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bh5kd,Uid:475c46cb-68e0-4e36-bf9a-87e71fb55867,Namespace:kube-system,Attempt:0,}" Feb 12 20:35:26.976409 env[1153]: time="2024-02-12T20:35:26.976349129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5t4z6,Uid:8a07d73f-80b6-4aa5-b973-9aa8bb72a760,Namespace:kube-system,Attempt:0,}" Feb 12 20:35:26.983681 env[1153]: time="2024-02-12T20:35:26.983625948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58689989f6-kzbtg,Uid:cc9151b7-617f-4846-a392-b04f10598ee4,Namespace:calico-system,Attempt:0,}" Feb 12 20:35:27.364350 env[1153]: time="2024-02-12T20:35:27.364281785Z" level=info msg="shim disconnected" id=c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2 Feb 12 20:35:27.364350 env[1153]: time="2024-02-12T20:35:27.364345023Z" level=warning msg="cleaning up after shim disconnected" id=c8ae1f3b8261f6788db68009541d0fc6026a0f1778888f989206ff205d223ad2 namespace=k8s.io Feb 12 20:35:27.364726 env[1153]: time="2024-02-12T20:35:27.364361930Z" level=info msg="cleaning up dead shim" Feb 12 20:35:27.398008 env[1153]: time="2024-02-12T20:35:27.397947993Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:35:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2817 runtime=io.containerd.runc.v2\n" Feb 12 20:35:27.505663 systemd[1]: Created slice kubepods-besteffort-pod642c913b_5f51_4318_b6c2_348fa0c076e1.slice. Feb 12 20:35:27.510886 env[1153]: time="2024-02-12T20:35:27.510827555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tckwb,Uid:642c913b-5f51-4318-b6c2-348fa0c076e1,Namespace:calico-system,Attempt:0,}" Feb 12 20:35:27.548521 env[1153]: time="2024-02-12T20:35:27.548406108Z" level=error msg="Failed to destroy network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.550130 env[1153]: time="2024-02-12T20:35:27.548879555Z" level=error msg="encountered an error cleaning up failed sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.550130 env[1153]: time="2024-02-12T20:35:27.548961158Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bh5kd,Uid:475c46cb-68e0-4e36-bf9a-87e71fb55867,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.550378 kubelet[2075]: E0212 20:35:27.549312 2075 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.550378 kubelet[2075]: E0212 20:35:27.549402 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-bh5kd" Feb 12 20:35:27.550378 kubelet[2075]: E0212 20:35:27.549441 2075 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-bh5kd" Feb 12 20:35:27.550678 kubelet[2075]: E0212 20:35:27.549552 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-bh5kd_kube-system(475c46cb-68e0-4e36-bf9a-87e71fb55867)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-bh5kd_kube-system(475c46cb-68e0-4e36-bf9a-87e71fb55867)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-bh5kd" podUID=475c46cb-68e0-4e36-bf9a-87e71fb55867 Feb 12 20:35:27.566835 env[1153]: time="2024-02-12T20:35:27.566758437Z" level=error msg="Failed to destroy network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.567742 env[1153]: time="2024-02-12T20:35:27.567639216Z" level=error msg="encountered an error cleaning up failed sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.568017 env[1153]: time="2024-02-12T20:35:27.567954654Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58689989f6-kzbtg,Uid:cc9151b7-617f-4846-a392-b04f10598ee4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.568604 kubelet[2075]: E0212 20:35:27.568572 2075 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.568737 kubelet[2075]: E0212 20:35:27.568659 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" Feb 12 20:35:27.568737 kubelet[2075]: E0212 20:35:27.568698 2075 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" Feb 12 20:35:27.568867 kubelet[2075]: E0212 20:35:27.568773 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-58689989f6-kzbtg_calico-system(cc9151b7-617f-4846-a392-b04f10598ee4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-58689989f6-kzbtg_calico-system(cc9151b7-617f-4846-a392-b04f10598ee4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" podUID=cc9151b7-617f-4846-a392-b04f10598ee4 Feb 12 20:35:27.593862 env[1153]: time="2024-02-12T20:35:27.593792277Z" level=error msg="Failed to destroy network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.600744 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1-shm.mount: Deactivated successfully. Feb 12 20:35:27.602904 env[1153]: time="2024-02-12T20:35:27.602836820Z" level=error msg="encountered an error cleaning up failed sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.603154 env[1153]: time="2024-02-12T20:35:27.603105910Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5t4z6,Uid:8a07d73f-80b6-4aa5-b973-9aa8bb72a760,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.603677 kubelet[2075]: E0212 20:35:27.603636 2075 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.603825 kubelet[2075]: E0212 20:35:27.603730 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5t4z6" Feb 12 20:35:27.603825 kubelet[2075]: E0212 20:35:27.603786 2075 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5t4z6" Feb 12 20:35:27.606565 kubelet[2075]: E0212 20:35:27.604405 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-5t4z6_kube-system(8a07d73f-80b6-4aa5-b973-9aa8bb72a760)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-5t4z6_kube-system(8a07d73f-80b6-4aa5-b973-9aa8bb72a760)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5t4z6" podUID=8a07d73f-80b6-4aa5-b973-9aa8bb72a760 Feb 12 20:35:27.645856 env[1153]: time="2024-02-12T20:35:27.643283889Z" level=error msg="Failed to destroy network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.649870 env[1153]: time="2024-02-12T20:35:27.647855714Z" level=error msg="encountered an error cleaning up failed sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.649870 env[1153]: time="2024-02-12T20:35:27.647957483Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tckwb,Uid:642c913b-5f51-4318-b6c2-348fa0c076e1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.649039 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2-shm.mount: Deactivated successfully. Feb 12 20:35:27.650203 kubelet[2075]: E0212 20:35:27.649964 2075 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.650203 kubelet[2075]: E0212 20:35:27.650049 2075 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:27.650203 kubelet[2075]: E0212 20:35:27.650088 2075 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tckwb" Feb 12 20:35:27.650795 kubelet[2075]: E0212 20:35:27.650184 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tckwb_calico-system(642c913b-5f51-4318-b6c2-348fa0c076e1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tckwb_calico-system(642c913b-5f51-4318-b6c2-348fa0c076e1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:27.719020 kubelet[2075]: I0212 20:35:27.718985 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:27.721061 env[1153]: time="2024-02-12T20:35:27.719858677Z" level=info msg="StopPodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\"" Feb 12 20:35:27.724362 kubelet[2075]: I0212 20:35:27.724337 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:27.727649 env[1153]: time="2024-02-12T20:35:27.727601645Z" level=info msg="StopPodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\"" Feb 12 20:35:27.737391 env[1153]: time="2024-02-12T20:35:27.737338604Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:35:27.741205 kubelet[2075]: I0212 20:35:27.741168 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:27.742098 env[1153]: time="2024-02-12T20:35:27.742055859Z" level=info msg="StopPodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\"" Feb 12 20:35:27.744065 kubelet[2075]: I0212 20:35:27.744036 2075 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:27.744692 env[1153]: time="2024-02-12T20:35:27.744630072Z" level=info msg="StopPodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\"" Feb 12 20:35:27.819947 env[1153]: time="2024-02-12T20:35:27.819868173Z" level=error msg="StopPodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" failed" error="failed to destroy network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.820268 kubelet[2075]: E0212 20:35:27.820235 2075 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:27.820408 kubelet[2075]: E0212 20:35:27.820315 2075 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03} Feb 12 20:35:27.820408 kubelet[2075]: E0212 20:35:27.820372 2075 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"475c46cb-68e0-4e36-bf9a-87e71fb55867\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:35:27.820616 kubelet[2075]: E0212 20:35:27.820416 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"475c46cb-68e0-4e36-bf9a-87e71fb55867\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-bh5kd" podUID=475c46cb-68e0-4e36-bf9a-87e71fb55867 Feb 12 20:35:27.859596 env[1153]: time="2024-02-12T20:35:27.859511937Z" level=error msg="StopPodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" failed" error="failed to destroy network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.859900 kubelet[2075]: E0212 20:35:27.859860 2075 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:27.860013 kubelet[2075]: E0212 20:35:27.859916 2075 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2} Feb 12 20:35:27.860013 kubelet[2075]: E0212 20:35:27.859969 2075 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"642c913b-5f51-4318-b6c2-348fa0c076e1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:35:27.860211 kubelet[2075]: E0212 20:35:27.860012 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"642c913b-5f51-4318-b6c2-348fa0c076e1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tckwb" podUID=642c913b-5f51-4318-b6c2-348fa0c076e1 Feb 12 20:35:27.861766 env[1153]: time="2024-02-12T20:35:27.861699660Z" level=error msg="StopPodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" failed" error="failed to destroy network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.861975 kubelet[2075]: E0212 20:35:27.861951 2075 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:27.862091 kubelet[2075]: E0212 20:35:27.861996 2075 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1} Feb 12 20:35:27.862091 kubelet[2075]: E0212 20:35:27.862049 2075 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8a07d73f-80b6-4aa5-b973-9aa8bb72a760\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:35:27.862273 kubelet[2075]: E0212 20:35:27.862094 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8a07d73f-80b6-4aa5-b973-9aa8bb72a760\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5t4z6" podUID=8a07d73f-80b6-4aa5-b973-9aa8bb72a760 Feb 12 20:35:27.869939 env[1153]: time="2024-02-12T20:35:27.869873117Z" level=error msg="StopPodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" failed" error="failed to destroy network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:35:27.870135 kubelet[2075]: E0212 20:35:27.870110 2075 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:27.870258 kubelet[2075]: E0212 20:35:27.870155 2075 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b} Feb 12 20:35:27.870258 kubelet[2075]: E0212 20:35:27.870204 2075 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc9151b7-617f-4846-a392-b04f10598ee4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:35:27.870258 kubelet[2075]: E0212 20:35:27.870245 2075 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc9151b7-617f-4846-a392-b04f10598ee4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" podUID=cc9151b7-617f-4846-a392-b04f10598ee4 Feb 12 20:35:29.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.24:22-85.209.11.27:51420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:29.692993 systemd[1]: Started sshd@7-10.128.0.24:22-85.209.11.27:51420.service. Feb 12 20:35:29.985561 kubelet[2075]: I0212 20:35:29.984766 2075 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:35:30.045000 audit[3043]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:30.045000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff30758550 a2=0 a3=7fff3075853c items=0 ppid=2262 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:30.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:30.047000 audit[3043]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:30.047000 audit[3043]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fff30758550 a2=0 a3=7fff3075853c items=0 ppid=2262 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:30.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:33.251754 sshd[3041]: Invalid user ubnt from 85.209.11.27 port 51420 Feb 12 20:35:33.451122 kernel: kauditd_printk_skb: 41 callbacks suppressed Feb 12 20:35:33.451294 kernel: audit: type=1100 audit(1707770133.419:1169): pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubnt" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 12 20:35:33.419000 audit[3041]: USER_AUTH pid=3041 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ubnt" exe="/usr/sbin/sshd" hostname=85.209.11.27 addr=85.209.11.27 terminal=ssh res=failed' Feb 12 20:35:33.451764 sshd[3041]: Failed password for invalid user ubnt from 85.209.11.27 port 51420 ssh2 Feb 12 20:35:33.670294 sshd[3041]: Connection closed by invalid user ubnt 85.209.11.27 port 51420 [preauth] Feb 12 20:35:33.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.24:22-85.209.11.27:51420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:33.697605 kernel: audit: type=1131 audit(1707770133.671:1170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.24:22-85.209.11.27:51420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:33.672248 systemd[1]: sshd@7-10.128.0.24:22-85.209.11.27:51420.service: Deactivated successfully. Feb 12 20:35:34.333726 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1848715135.mount: Deactivated successfully. Feb 12 20:35:34.386890 env[1153]: time="2024-02-12T20:35:34.386820978Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:34.389590 env[1153]: time="2024-02-12T20:35:34.389546652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:34.391971 env[1153]: time="2024-02-12T20:35:34.391910749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:34.394333 env[1153]: time="2024-02-12T20:35:34.394287433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:34.395077 env[1153]: time="2024-02-12T20:35:34.395034984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:35:34.423319 env[1153]: time="2024-02-12T20:35:34.423244109Z" level=info msg="CreateContainer within sandbox \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:35:34.446170 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4032286909.mount: Deactivated successfully. Feb 12 20:35:34.450813 env[1153]: time="2024-02-12T20:35:34.450738766Z" level=info msg="CreateContainer within sandbox \"249c4e90da938c62e4fc4867d4c83645ec605e6249b3f9b533863263b17fd479\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281\"" Feb 12 20:35:34.452806 env[1153]: time="2024-02-12T20:35:34.451542375Z" level=info msg="StartContainer for \"ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281\"" Feb 12 20:35:34.478399 systemd[1]: Started cri-containerd-ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281.scope. Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.563292 kernel: audit: type=1400 audit(1707770134.506:1171): avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.563491 kernel: audit: type=1300 audit(1707770134.506:1171): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe6f57cf1c8 items=0 ppid=2529 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:34.563547 kernel: audit: type=1327 audit(1707770134.506:1171): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164653336393638386231613561366536613632393166643663666330 Feb 12 20:35:34.506000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fe6f57cf1c8 items=0 ppid=2529 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:34.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164653336393638386231613561366536613632393166643663666330 Feb 12 20:35:34.610991 kernel: audit: type=1400 audit(1707770134.506:1172): avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.631964 kernel: audit: type=1400 audit(1707770134.506:1172): avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.632365 kernel: audit: type=1400 audit(1707770134.506:1172): avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.674415 kernel: audit: type=1400 audit(1707770134.506:1172): avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.697102 kernel: audit: type=1400 audit(1707770134.506:1172): avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.506000 audit: BPF prog-id=145 op=LOAD Feb 12 20:35:34.506000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002f3c58 items=0 ppid=2529 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:34.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164653336393638386231613561366536613632393166643663666330 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.589000 audit: BPF prog-id=146 op=LOAD Feb 12 20:35:34.589000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002f3ca8 items=0 ppid=2529 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:34.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164653336393638386231613561366536613632393166643663666330 Feb 12 20:35:34.609000 audit: BPF prog-id=146 op=UNLOAD Feb 12 20:35:34.609000 audit: BPF prog-id=145 op=UNLOAD Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { perfmon } for pid=3061 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit[3061]: AVC avc: denied { bpf } for pid=3061 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:34.609000 audit: BPF prog-id=147 op=LOAD Feb 12 20:35:34.609000 audit[3061]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002f3d38 items=0 ppid=2529 pid=3061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:34.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164653336393638386231613561366536613632393166643663666330 Feb 12 20:35:34.700926 env[1153]: time="2024-02-12T20:35:34.699642429Z" level=info msg="StartContainer for \"ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281\" returns successfully" Feb 12 20:35:34.812327 kubelet[2075]: I0212 20:35:34.812287 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pv224" podStartSLOduration=1.769758481 podCreationTimestamp="2024-02-12 20:35:13 +0000 UTC" firstStartedPulling="2024-02-12 20:35:14.352944068 +0000 UTC m=+21.110486936" lastFinishedPulling="2024-02-12 20:35:34.395419688 +0000 UTC m=+41.152962575" observedRunningTime="2024-02-12 20:35:34.810972628 +0000 UTC m=+41.568515539" watchObservedRunningTime="2024-02-12 20:35:34.81223412 +0000 UTC m=+41.569777014" Feb 12 20:35:34.846345 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:35:34.846560 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:35:35.807366 systemd[1]: run-containerd-runc-k8s.io-ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281-runc.OyUKZI.mount: Deactivated successfully. Feb 12 20:35:36.334000 audit[3205]: AVC avc: denied { write } for pid=3205 comm="tee" name="fd" dev="proc" ino=23538 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.334000 audit[3205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffead98933 a2=241 a3=1b6 items=1 ppid=3175 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.334000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:35:36.334000 audit: PATH item=0 name="/dev/fd/63" inode=24338 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.334000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.345000 audit[3207]: AVC avc: denied { write } for pid=3207 comm="tee" name="fd" dev="proc" ino=23547 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.345000 audit[3207]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce3ac2931 a2=241 a3=1b6 items=1 ppid=3171 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.345000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:35:36.345000 audit: PATH item=0 name="/dev/fd/63" inode=23531 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.375000 audit[3241]: AVC avc: denied { write } for pid=3241 comm="tee" name="fd" dev="proc" ino=24352 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.376000 audit[3238]: AVC avc: denied { write } for pid=3238 comm="tee" name="fd" dev="proc" ino=24355 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.376000 audit[3238]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb65a0931 a2=241 a3=1b6 items=1 ppid=3170 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.376000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:35:36.376000 audit: PATH item=0 name="/dev/fd/63" inode=24582 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.376000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.375000 audit[3241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff39ca932 a2=241 a3=1b6 items=1 ppid=3183 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.375000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:35:36.375000 audit: PATH item=0 name="/dev/fd/63" inode=24583 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.375000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.380000 audit[3216]: AVC avc: denied { write } for pid=3216 comm="tee" name="fd" dev="proc" ino=24588 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.380000 audit[3216]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8e24d922 a2=241 a3=1b6 items=1 ppid=3177 pid=3216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.380000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:35:36.380000 audit: PATH item=0 name="/dev/fd/63" inode=23535 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.380000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.385000 audit[3222]: AVC avc: denied { write } for pid=3222 comm="tee" name="fd" dev="proc" ino=24361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.385000 audit[3222]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffebea7a921 a2=241 a3=1b6 items=1 ppid=3181 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.385000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:35:36.385000 audit: PATH item=0 name="/dev/fd/63" inode=23540 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.385000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.389000 audit[3228]: AVC avc: denied { write } for pid=3228 comm="tee" name="fd" dev="proc" ino=24365 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:35:36.389000 audit[3228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcabcd6931 a2=241 a3=1b6 items=1 ppid=3174 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.389000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:35:36.389000 audit: PATH item=0 name="/dev/fd/63" inode=23550 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:35:36.389000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit: BPF prog-id=148 op=LOAD Feb 12 20:35:36.857000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd46e5df0 a2=70 a3=7f566d43e000 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.857000 audit: BPF prog-id=148 op=UNLOAD Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit: BPF prog-id=149 op=LOAD Feb 12 20:35:36.857000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd46e5df0 a2=70 a3=6e items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.857000 audit: BPF prog-id=149 op=UNLOAD Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffd46e5da0 a2=70 a3=7fffd46e5df0 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.857000 audit: BPF prog-id=150 op=LOAD Feb 12 20:35:36.857000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffd46e5d80 a2=70 a3=7fffd46e5df0 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.857000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.857000 audit: BPF prog-id=150 op=UNLOAD Feb 12 20:35:36.858000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.858000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd46e5e60 a2=70 a3=0 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.858000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.858000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd46e5e50 a2=70 a3=0 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.858000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.858000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fffd46e5e90 a2=70 a3=0 items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.858000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { perfmon } for pid=3306 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.859000 audit: BPF prog-id=151 op=LOAD Feb 12 20:35:36.859000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fffd46e5db0 a2=70 a3=ffffffff items=0 ppid=3173 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.859000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:35:36.864000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.864000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdc9af2da0 a2=70 a3=fff80800 items=0 ppid=3173 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:35:36.864000 audit[3309]: AVC avc: denied { bpf } for pid=3309 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:36.864000 audit[3309]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdc9af2c70 a2=70 a3=3 items=0 ppid=3173 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.864000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:35:36.872000 audit: BPF prog-id=151 op=UNLOAD Feb 12 20:35:36.964000 audit[3334]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:36.964000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc2720c4f0 a2=0 a3=7ffc2720c4dc items=0 ppid=3173 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.964000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:36.970000 audit[3333]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:36.970000 audit[3333]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe05af2960 a2=0 a3=5623de7d4000 items=0 ppid=3173 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.970000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:36.972000 audit[3335]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:36.972000 audit[3335]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff388da8f0 a2=0 a3=55e0b20c9000 items=0 ppid=3173 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.972000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:36.978000 audit[3339]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3339 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:36.978000 audit[3339]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffcc999c9f0 a2=0 a3=56305ae1e000 items=0 ppid=3173 pid=3339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:36.978000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:37.684365 systemd-networkd[1026]: vxlan.calico: Link UP Feb 12 20:35:37.684377 systemd-networkd[1026]: vxlan.calico: Gained carrier Feb 12 20:35:38.496779 env[1153]: time="2024-02-12T20:35:38.496169332Z" level=info msg="StopPodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\"" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.553 [INFO][3364] k8s.go 578: Cleaning up netns ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.553 [INFO][3364] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" iface="eth0" netns="/var/run/netns/cni-9858d0c8-301e-c399-c0f9-9216467a161f" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.554 [INFO][3364] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" iface="eth0" netns="/var/run/netns/cni-9858d0c8-301e-c399-c0f9-9216467a161f" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.554 [INFO][3364] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" iface="eth0" netns="/var/run/netns/cni-9858d0c8-301e-c399-c0f9-9216467a161f" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.554 [INFO][3364] k8s.go 585: Releasing IP address(es) ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.554 [INFO][3364] utils.go 188: Calico CNI releasing IP address ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.581 [INFO][3371] ipam_plugin.go 415: Releasing address using handleID ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.582 [INFO][3371] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.582 [INFO][3371] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.589 [WARNING][3371] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.590 [INFO][3371] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.591 [INFO][3371] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:38.594424 env[1153]: 2024-02-12 20:35:38.593 [INFO][3364] k8s.go 591: Teardown processing complete. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:38.598263 systemd[1]: run-netns-cni\x2d9858d0c8\x2d301e\x2dc399\x2dc0f9\x2d9216467a161f.mount: Deactivated successfully. Feb 12 20:35:38.599996 env[1153]: time="2024-02-12T20:35:38.599566555Z" level=info msg="TearDown network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" successfully" Feb 12 20:35:38.599996 env[1153]: time="2024-02-12T20:35:38.599624177Z" level=info msg="StopPodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" returns successfully" Feb 12 20:35:38.601055 env[1153]: time="2024-02-12T20:35:38.601010469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bh5kd,Uid:475c46cb-68e0-4e36-bf9a-87e71fb55867,Namespace:kube-system,Attempt:1,}" Feb 12 20:35:38.772423 systemd-networkd[1026]: cali2dec4391643: Link UP Feb 12 20:35:38.780761 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:35:38.790459 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2dec4391643: link becomes ready Feb 12 20:35:38.791931 systemd-networkd[1026]: cali2dec4391643: Gained carrier Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.670 [INFO][3377] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0 coredns-5d78c9869d- kube-system 475c46cb-68e0-4e36-bf9a-87e71fb55867 711 0 2024-02-12 20:35:08 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal coredns-5d78c9869d-bh5kd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2dec4391643 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.671 [INFO][3377] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.718 [INFO][3389] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" HandleID="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.733 [INFO][3389] ipam_plugin.go 268: Auto assigning IP ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" HandleID="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ada10), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-bh5kd", "timestamp":"2024-02-12 20:35:38.718634074 +0000 UTC"}, Hostname:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.733 [INFO][3389] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.733 [INFO][3389] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.733 [INFO][3389] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.735 [INFO][3389] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.739 [INFO][3389] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.743 [INFO][3389] ipam.go 489: Trying affinity for 192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.746 [INFO][3389] ipam.go 155: Attempting to load block cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.748 [INFO][3389] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.748 [INFO][3389] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.192/26 handle="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.750 [INFO][3389] ipam.go 1682: Creating new handle: k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257 Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.755 [INFO][3389] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.192/26 handle="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.760 [INFO][3389] ipam.go 1216: Successfully claimed IPs: [192.168.89.193/26] block=192.168.89.192/26 handle="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.760 [INFO][3389] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.193/26] handle="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.760 [INFO][3389] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:38.807557 env[1153]: 2024-02-12 20:35:38.760 [INFO][3389] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.193/26] IPv6=[] ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" HandleID="k8s-pod-network.79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.808801 env[1153]: 2024-02-12 20:35:38.765 [INFO][3377] k8s.go 385: Populated endpoint ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"475c46cb-68e0-4e36-bf9a-87e71fb55867", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-bh5kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dec4391643", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:38.808801 env[1153]: 2024-02-12 20:35:38.765 [INFO][3377] k8s.go 386: Calico CNI using IPs: [192.168.89.193/32] ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.808801 env[1153]: 2024-02-12 20:35:38.765 [INFO][3377] dataplane_linux.go 68: Setting the host side veth name to cali2dec4391643 ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.808801 env[1153]: 2024-02-12 20:35:38.791 [INFO][3377] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.808801 env[1153]: 2024-02-12 20:35:38.791 [INFO][3377] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"475c46cb-68e0-4e36-bf9a-87e71fb55867", ResourceVersion:"711", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257", Pod:"coredns-5d78c9869d-bh5kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dec4391643", MAC:"b2:9c:d6:b5:23:ad", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:38.808801 env[1153]: 2024-02-12 20:35:38.803 [INFO][3377] k8s.go 491: Wrote updated endpoint to datastore ContainerID="79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257" Namespace="kube-system" Pod="coredns-5d78c9869d-bh5kd" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:38.828827 env[1153]: time="2024-02-12T20:35:38.828734779Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:38.829134 env[1153]: time="2024-02-12T20:35:38.829080255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:38.829332 env[1153]: time="2024-02-12T20:35:38.829282511Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:38.829716 env[1153]: time="2024-02-12T20:35:38.829667754Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257 pid=3414 runtime=io.containerd.runc.v2 Feb 12 20:35:38.870625 systemd[1]: Started cri-containerd-79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257.scope. Feb 12 20:35:38.889000 audit[3444]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3444 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:38.896966 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 12 20:35:38.897085 kernel: audit: type=1325 audit(1707770138.889:1202): table=filter:101 family=2 entries=36 op=nft_register_chain pid=3444 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:38.947992 kernel: audit: type=1300 audit(1707770138.889:1202): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffedf1624e0 a2=0 a3=7ffedf1624cc items=0 ppid=3173 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.889000 audit[3444]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffedf1624e0 a2=0 a3=7ffedf1624cc items=0 ppid=3173 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.889000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:38.970543 kernel: audit: type=1327 audit(1707770138.889:1202): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.991667 kernel: audit: type=1400 audit(1707770138.900:1203): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.991790 kernel: audit: type=1400 audit(1707770138.900:1204): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.054718 kernel: audit: type=1400 audit(1707770138.900:1205): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.054877 kernel: audit: type=1400 audit(1707770138.900:1206): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.082977 env[1153]: time="2024-02-12T20:35:39.082871659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-bh5kd,Uid:475c46cb-68e0-4e36-bf9a-87e71fb55867,Namespace:kube-system,Attempt:1,} returns sandbox id \"79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257\"" Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.094509 env[1153]: time="2024-02-12T20:35:39.094452317Z" level=info msg="CreateContainer within sandbox \"79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:35:39.107155 kernel: audit: type=1400 audit(1707770138.900:1207): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.107360 kernel: audit: type=1400 audit(1707770138.900:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.107419 kernel: audit: type=1400 audit(1707770138.900:1209): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit: BPF prog-id=152 op=LOAD Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3414 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653639356438326138313164393231323465373935303739623537 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3414 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653639356438326138313164393231323465373935303739623537 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.912000 audit: BPF prog-id=153 op=LOAD Feb 12 20:35:38.912000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000288af0 items=0 ppid=3414 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653639356438326138313164393231323465373935303739623537 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit: BPF prog-id=154 op=LOAD Feb 12 20:35:38.947000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000288b38 items=0 ppid=3414 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653639356438326138313164393231323465373935303739623537 Feb 12 20:35:38.947000 audit: BPF prog-id=154 op=UNLOAD Feb 12 20:35:38.947000 audit: BPF prog-id=153 op=UNLOAD Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { perfmon } for pid=3426 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit[3426]: AVC avc: denied { bpf } for pid=3426 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:38.947000 audit: BPF prog-id=155 op=LOAD Feb 12 20:35:38.947000 audit[3426]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000288f48 items=0 ppid=3414 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:38.947000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739653639356438326138313164393231323465373935303739623537 Feb 12 20:35:39.134550 env[1153]: time="2024-02-12T20:35:39.134487424Z" level=info msg="CreateContainer within sandbox \"79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4f46ca2e361736e402073cad88ad2fb08d96e2fc0e0442104a24ad06855ce8f2\"" Feb 12 20:35:39.137119 env[1153]: time="2024-02-12T20:35:39.135673843Z" level=info msg="StartContainer for \"4f46ca2e361736e402073cad88ad2fb08d96e2fc0e0442104a24ad06855ce8f2\"" Feb 12 20:35:39.158549 systemd[1]: Started cri-containerd-4f46ca2e361736e402073cad88ad2fb08d96e2fc0e0442104a24ad06855ce8f2.scope. Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit: BPF prog-id=156 op=LOAD Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3414 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343663613265333631373336653430323037336361643838616432 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3414 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343663613265333631373336653430323037336361643838616432 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.180000 audit: BPF prog-id=157 op=LOAD Feb 12 20:35:39.180000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d2a00 items=0 ppid=3414 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343663613265333631373336653430323037336361643838616432 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit: BPF prog-id=158 op=LOAD Feb 12 20:35:39.181000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d2a48 items=0 ppid=3414 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343663613265333631373336653430323037336361643838616432 Feb 12 20:35:39.181000 audit: BPF prog-id=158 op=UNLOAD Feb 12 20:35:39.181000 audit: BPF prog-id=157 op=UNLOAD Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { perfmon } for pid=3461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit[3461]: AVC avc: denied { bpf } for pid=3461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.181000 audit: BPF prog-id=159 op=LOAD Feb 12 20:35:39.181000 audit[3461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d2e58 items=0 ppid=3414 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343663613265333631373336653430323037336361643838616432 Feb 12 20:35:39.202505 env[1153]: time="2024-02-12T20:35:39.202436622Z" level=info msg="StartContainer for \"4f46ca2e361736e402073cad88ad2fb08d96e2fc0e0442104a24ad06855ce8f2\" returns successfully" Feb 12 20:35:39.498747 env[1153]: time="2024-02-12T20:35:39.498302561Z" level=info msg="StopPodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\"" Feb 12 20:35:39.600251 systemd[1]: run-containerd-runc-k8s.io-79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257-runc.rGpQWV.mount: Deactivated successfully. Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.557 [INFO][3506] k8s.go 578: Cleaning up netns ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.557 [INFO][3506] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" iface="eth0" netns="/var/run/netns/cni-8240e82e-2c83-bd1d-9aa4-3917433eef67" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.557 [INFO][3506] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" iface="eth0" netns="/var/run/netns/cni-8240e82e-2c83-bd1d-9aa4-3917433eef67" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.558 [INFO][3506] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" iface="eth0" netns="/var/run/netns/cni-8240e82e-2c83-bd1d-9aa4-3917433eef67" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.558 [INFO][3506] k8s.go 585: Releasing IP address(es) ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.558 [INFO][3506] utils.go 188: Calico CNI releasing IP address ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.586 [INFO][3512] ipam_plugin.go 415: Releasing address using handleID ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.586 [INFO][3512] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.586 [INFO][3512] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.603 [WARNING][3512] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.603 [INFO][3512] ipam_plugin.go 443: Releasing address using workloadID ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.605 [INFO][3512] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:39.609260 env[1153]: 2024-02-12 20:35:39.607 [INFO][3506] k8s.go 591: Teardown processing complete. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:39.614881 env[1153]: time="2024-02-12T20:35:39.613338145Z" level=info msg="TearDown network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" successfully" Feb 12 20:35:39.614881 env[1153]: time="2024-02-12T20:35:39.613388976Z" level=info msg="StopPodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" returns successfully" Feb 12 20:35:39.613109 systemd[1]: run-netns-cni\x2d8240e82e\x2d2c83\x2dbd1d\x2d9aa4\x2d3917433eef67.mount: Deactivated successfully. Feb 12 20:35:39.615496 env[1153]: time="2024-02-12T20:35:39.615421409Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tckwb,Uid:642c913b-5f51-4318-b6c2-348fa0c076e1,Namespace:calico-system,Attempt:1,}" Feb 12 20:35:39.687142 systemd-networkd[1026]: vxlan.calico: Gained IPv6LL Feb 12 20:35:39.769594 systemd-networkd[1026]: cali62fd7362e64: Link UP Feb 12 20:35:39.781829 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali62fd7362e64: link becomes ready Feb 12 20:35:39.782790 systemd-networkd[1026]: cali62fd7362e64: Gained carrier Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.677 [INFO][3518] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0 csi-node-driver- calico-system 642c913b-5f51-4318-b6c2-348fa0c076e1 721 0 2024-02-12 20:35:14 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal csi-node-driver-tckwb eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali62fd7362e64 [] []}} ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.678 [INFO][3518] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.716 [INFO][3529] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" HandleID="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.731 [INFO][3529] ipam_plugin.go 268: Auto assigning IP ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" HandleID="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027dac0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", "pod":"csi-node-driver-tckwb", "timestamp":"2024-02-12 20:35:39.716926069 +0000 UTC"}, Hostname:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.731 [INFO][3529] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.731 [INFO][3529] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.731 [INFO][3529] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.734 [INFO][3529] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.738 [INFO][3529] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.743 [INFO][3529] ipam.go 489: Trying affinity for 192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.745 [INFO][3529] ipam.go 155: Attempting to load block cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.748 [INFO][3529] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.748 [INFO][3529] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.192/26 handle="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.750 [INFO][3529] ipam.go 1682: Creating new handle: k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7 Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.755 [INFO][3529] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.192/26 handle="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.761 [INFO][3529] ipam.go 1216: Successfully claimed IPs: [192.168.89.194/26] block=192.168.89.192/26 handle="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.761 [INFO][3529] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.194/26] handle="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.761 [INFO][3529] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:39.800122 env[1153]: 2024-02-12 20:35:39.761 [INFO][3529] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.194/26] IPv6=[] ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" HandleID="k8s-pod-network.549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.801426 env[1153]: 2024-02-12 20:35:39.763 [INFO][3518] k8s.go 385: Populated endpoint ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"642c913b-5f51-4318-b6c2-348fa0c076e1", ResourceVersion:"721", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-tckwb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62fd7362e64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:39.801426 env[1153]: 2024-02-12 20:35:39.763 [INFO][3518] k8s.go 386: Calico CNI using IPs: [192.168.89.194/32] ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.801426 env[1153]: 2024-02-12 20:35:39.763 [INFO][3518] dataplane_linux.go 68: Setting the host side veth name to cali62fd7362e64 ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.801426 env[1153]: 2024-02-12 20:35:39.782 [INFO][3518] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.801426 env[1153]: 2024-02-12 20:35:39.783 [INFO][3518] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"642c913b-5f51-4318-b6c2-348fa0c076e1", ResourceVersion:"721", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7", Pod:"csi-node-driver-tckwb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62fd7362e64", MAC:"6a:47:2b:2e:c0:54", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:39.801426 env[1153]: 2024-02-12 20:35:39.795 [INFO][3518] k8s.go 491: Wrote updated endpoint to datastore ContainerID="549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7" Namespace="calico-system" Pod="csi-node-driver-tckwb" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:39.819863 kubelet[2075]: I0212 20:35:39.819822 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-bh5kd" podStartSLOduration=31.819671295 podCreationTimestamp="2024-02-12 20:35:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:35:39.819375286 +0000 UTC m=+46.576918181" watchObservedRunningTime="2024-02-12 20:35:39.819671295 +0000 UTC m=+46.577214188" Feb 12 20:35:39.828610 env[1153]: time="2024-02-12T20:35:39.825851896Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:39.828610 env[1153]: time="2024-02-12T20:35:39.825932331Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:39.828610 env[1153]: time="2024-02-12T20:35:39.825951610Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:39.829320 env[1153]: time="2024-02-12T20:35:39.829247804Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7 pid=3554 runtime=io.containerd.runc.v2 Feb 12 20:35:39.864000 audit[3574]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:39.864000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff201b6650 a2=0 a3=7fff201b663c items=0 ppid=2262 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:39.873000 audit[3574]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:39.873000 audit[3574]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff201b6650 a2=0 a3=31030 items=0 ppid=2262 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:39.878774 systemd-networkd[1026]: cali2dec4391643: Gained IPv6LL Feb 12 20:35:39.895937 systemd[1]: Started cri-containerd-549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7.scope. Feb 12 20:35:39.913000 audit[3583]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:39.913000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcd72ef8e0 a2=0 a3=7ffcd72ef8cc items=0 ppid=2262 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:39.917000 audit[3583]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:39.917000 audit[3583]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcd72ef8e0 a2=0 a3=7ffcd72ef8cc items=0 ppid=2262 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.930000 audit: BPF prog-id=160 op=LOAD Feb 12 20:35:39.931000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.931000 audit[3567]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3554 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396465626232323061306330613530306463353530653939666565 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3554 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396465626232323061306330613530306463353530653939666565 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.932000 audit: BPF prog-id=161 op=LOAD Feb 12 20:35:39.932000 audit[3567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000230d50 items=0 ppid=3554 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396465626232323061306330613530306463353530653939666565 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.933000 audit: BPF prog-id=162 op=LOAD Feb 12 20:35:39.933000 audit[3567]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000230d98 items=0 ppid=3554 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396465626232323061306330613530306463353530653939666565 Feb 12 20:35:39.934000 audit: BPF prog-id=162 op=UNLOAD Feb 12 20:35:39.935000 audit: BPF prog-id=161 op=UNLOAD Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { perfmon } for pid=3567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit[3567]: AVC avc: denied { bpf } for pid=3567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:39.935000 audit: BPF prog-id=163 op=LOAD Feb 12 20:35:39.935000 audit[3567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002311a8 items=0 ppid=3554 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534396465626232323061306330613530306463353530653939666565 Feb 12 20:35:39.946000 audit[3590]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=3590 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:39.946000 audit[3590]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffc9ab3c3c0 a2=0 a3=7ffc9ab3c3ac items=0 ppid=3173 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:39.946000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:39.956874 env[1153]: time="2024-02-12T20:35:39.956829806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tckwb,Uid:642c913b-5f51-4318-b6c2-348fa0c076e1,Namespace:calico-system,Attempt:1,} returns sandbox id \"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7\"" Feb 12 20:35:39.959564 env[1153]: time="2024-02-12T20:35:39.959513801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:35:40.598629 systemd[1]: run-containerd-runc-k8s.io-549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7-runc.hbnzSk.mount: Deactivated successfully. Feb 12 20:35:41.059131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2496153480.mount: Deactivated successfully. Feb 12 20:35:41.440459 env[1153]: time="2024-02-12T20:35:41.440313779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:41.443420 env[1153]: time="2024-02-12T20:35:41.443370128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:41.445971 env[1153]: time="2024-02-12T20:35:41.445931307Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:41.448288 env[1153]: time="2024-02-12T20:35:41.448243521Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:41.449190 env[1153]: time="2024-02-12T20:35:41.449126052Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:35:41.453819 env[1153]: time="2024-02-12T20:35:41.453762081Z" level=info msg="CreateContainer within sandbox \"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:35:41.474285 env[1153]: time="2024-02-12T20:35:41.474224404Z" level=info msg="CreateContainer within sandbox \"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"48c1760d21fcc4d1c9c092e622802e99ae6466e45b5417c680c8a4e0215780d0\"" Feb 12 20:35:41.477264 env[1153]: time="2024-02-12T20:35:41.477224676Z" level=info msg="StartContainer for \"48c1760d21fcc4d1c9c092e622802e99ae6466e45b5417c680c8a4e0215780d0\"" Feb 12 20:35:41.511569 systemd[1]: Started cri-containerd-48c1760d21fcc4d1c9c092e622802e99ae6466e45b5417c680c8a4e0215780d0.scope. Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7ff5a42a7718 items=0 ppid=3554 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:41.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438633137363064323166636334643163396330393265363232383032 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.540000 audit: BPF prog-id=164 op=LOAD Feb 12 20:35:41.540000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000396f28 items=0 ppid=3554 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:41.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438633137363064323166636334643163396330393265363232383032 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.541000 audit: BPF prog-id=165 op=LOAD Feb 12 20:35:41.541000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000396f78 items=0 ppid=3554 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:41.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438633137363064323166636334643163396330393265363232383032 Feb 12 20:35:41.543000 audit: BPF prog-id=165 op=UNLOAD Feb 12 20:35:41.543000 audit: BPF prog-id=164 op=UNLOAD Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { perfmon } for pid=3607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit[3607]: AVC avc: denied { bpf } for pid=3607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:41.543000 audit: BPF prog-id=166 op=LOAD Feb 12 20:35:41.543000 audit[3607]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000397008 items=0 ppid=3554 pid=3607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:41.543000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438633137363064323166636334643163396330393265363232383032 Feb 12 20:35:41.576508 env[1153]: time="2024-02-12T20:35:41.576137300Z" level=info msg="StartContainer for \"48c1760d21fcc4d1c9c092e622802e99ae6466e45b5417c680c8a4e0215780d0\" returns successfully" Feb 12 20:35:41.579845 env[1153]: time="2024-02-12T20:35:41.579802198Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:35:41.798659 systemd-networkd[1026]: cali62fd7362e64: Gained IPv6LL Feb 12 20:35:42.496629 env[1153]: time="2024-02-12T20:35:42.496531898Z" level=info msg="StopPodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\"" Feb 12 20:35:42.498094 env[1153]: time="2024-02-12T20:35:42.498021097Z" level=info msg="StopPodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\"" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.601 [INFO][3677] k8s.go 578: Cleaning up netns ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.602 [INFO][3677] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" iface="eth0" netns="/var/run/netns/cni-b081c792-5092-6ff1-f71f-4a7d98c2c7dd" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.603 [INFO][3677] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" iface="eth0" netns="/var/run/netns/cni-b081c792-5092-6ff1-f71f-4a7d98c2c7dd" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.603 [INFO][3677] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" iface="eth0" netns="/var/run/netns/cni-b081c792-5092-6ff1-f71f-4a7d98c2c7dd" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.603 [INFO][3677] k8s.go 585: Releasing IP address(es) ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.603 [INFO][3677] utils.go 188: Calico CNI releasing IP address ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.643 [INFO][3689] ipam_plugin.go 415: Releasing address using handleID ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.643 [INFO][3689] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.645 [INFO][3689] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.655 [WARNING][3689] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.655 [INFO][3689] ipam_plugin.go 443: Releasing address using workloadID ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.657 [INFO][3689] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:42.671623 env[1153]: 2024-02-12 20:35:42.670 [INFO][3677] k8s.go 591: Teardown processing complete. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:42.680001 systemd[1]: run-netns-cni\x2db081c792\x2d5092\x2d6ff1\x2df71f\x2d4a7d98c2c7dd.mount: Deactivated successfully. Feb 12 20:35:42.682181 env[1153]: time="2024-02-12T20:35:42.682131188Z" level=info msg="TearDown network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" successfully" Feb 12 20:35:42.682332 env[1153]: time="2024-02-12T20:35:42.682301218Z" level=info msg="StopPodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" returns successfully" Feb 12 20:35:42.683225 env[1153]: time="2024-02-12T20:35:42.683187831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58689989f6-kzbtg,Uid:cc9151b7-617f-4846-a392-b04f10598ee4,Namespace:calico-system,Attempt:1,}" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.595 [INFO][3669] k8s.go 578: Cleaning up netns ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.595 [INFO][3669] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" iface="eth0" netns="/var/run/netns/cni-0c11ca62-380d-27ee-97c5-928f9caf179d" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.595 [INFO][3669] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" iface="eth0" netns="/var/run/netns/cni-0c11ca62-380d-27ee-97c5-928f9caf179d" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.596 [INFO][3669] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" iface="eth0" netns="/var/run/netns/cni-0c11ca62-380d-27ee-97c5-928f9caf179d" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.596 [INFO][3669] k8s.go 585: Releasing IP address(es) ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.596 [INFO][3669] utils.go 188: Calico CNI releasing IP address ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.646 [INFO][3685] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.646 [INFO][3685] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.657 [INFO][3685] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.669 [WARNING][3685] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.669 [INFO][3685] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.672 [INFO][3685] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:42.710307 env[1153]: 2024-02-12 20:35:42.684 [INFO][3669] k8s.go 591: Teardown processing complete. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:42.710307 env[1153]: time="2024-02-12T20:35:42.709787981Z" level=info msg="TearDown network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" successfully" Feb 12 20:35:42.710307 env[1153]: time="2024-02-12T20:35:42.709831770Z" level=info msg="StopPodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" returns successfully" Feb 12 20:35:42.727594 systemd[1]: run-netns-cni\x2d0c11ca62\x2d380d\x2d27ee\x2d97c5\x2d928f9caf179d.mount: Deactivated successfully. Feb 12 20:35:42.730226 env[1153]: time="2024-02-12T20:35:42.730169253Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5t4z6,Uid:8a07d73f-80b6-4aa5-b973-9aa8bb72a760,Namespace:kube-system,Attempt:1,}" Feb 12 20:35:42.979973 systemd-networkd[1026]: caliafe9c05041a: Link UP Feb 12 20:35:42.988504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:35:42.997504 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliafe9c05041a: link becomes ready Feb 12 20:35:43.000546 systemd-networkd[1026]: caliafe9c05041a: Gained carrier Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.801 [INFO][3698] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0 calico-kube-controllers-58689989f6- calico-system cc9151b7-617f-4846-a392-b04f10598ee4 747 0 2024-02-12 20:35:14 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:58689989f6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal calico-kube-controllers-58689989f6-kzbtg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliafe9c05041a [] []}} ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.801 [INFO][3698] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.910 [INFO][3722] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" HandleID="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.924 [INFO][3722] ipam_plugin.go 268: Auto assigning IP ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" HandleID="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d730), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", "pod":"calico-kube-controllers-58689989f6-kzbtg", "timestamp":"2024-02-12 20:35:42.910027091 +0000 UTC"}, Hostname:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.924 [INFO][3722] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.924 [INFO][3722] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.924 [INFO][3722] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.926 [INFO][3722] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.932 [INFO][3722] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.936 [INFO][3722] ipam.go 489: Trying affinity for 192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.938 [INFO][3722] ipam.go 155: Attempting to load block cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.942 [INFO][3722] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.942 [INFO][3722] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.192/26 handle="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.944 [INFO][3722] ipam.go 1682: Creating new handle: k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.949 [INFO][3722] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.192/26 handle="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.961 [INFO][3722] ipam.go 1216: Successfully claimed IPs: [192.168.89.195/26] block=192.168.89.192/26 handle="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.961 [INFO][3722] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.195/26] handle="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.962 [INFO][3722] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:43.023563 env[1153]: 2024-02-12 20:35:42.962 [INFO][3722] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.195/26] IPv6=[] ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" HandleID="k8s-pod-network.26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.024815 env[1153]: 2024-02-12 20:35:42.963 [INFO][3698] k8s.go 385: Populated endpoint ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0", GenerateName:"calico-kube-controllers-58689989f6-", Namespace:"calico-system", SelfLink:"", UID:"cc9151b7-617f-4846-a392-b04f10598ee4", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58689989f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-58689989f6-kzbtg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.89.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliafe9c05041a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:43.024815 env[1153]: 2024-02-12 20:35:42.964 [INFO][3698] k8s.go 386: Calico CNI using IPs: [192.168.89.195/32] ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.024815 env[1153]: 2024-02-12 20:35:42.964 [INFO][3698] dataplane_linux.go 68: Setting the host side veth name to caliafe9c05041a ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.024815 env[1153]: 2024-02-12 20:35:43.001 [INFO][3698] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.024815 env[1153]: 2024-02-12 20:35:43.002 [INFO][3698] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0", GenerateName:"calico-kube-controllers-58689989f6-", Namespace:"calico-system", SelfLink:"", UID:"cc9151b7-617f-4846-a392-b04f10598ee4", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58689989f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb", Pod:"calico-kube-controllers-58689989f6-kzbtg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.89.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliafe9c05041a", MAC:"be:68:d5:4f:34:59", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:43.024815 env[1153]: 2024-02-12 20:35:43.017 [INFO][3698] k8s.go 491: Wrote updated endpoint to datastore ContainerID="26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb" Namespace="calico-system" Pod="calico-kube-controllers-58689989f6-kzbtg" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:43.094610 env[1153]: time="2024-02-12T20:35:43.094514292Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:43.094836 env[1153]: time="2024-02-12T20:35:43.094622988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:43.094836 env[1153]: time="2024-02-12T20:35:43.094665384Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:43.094967 env[1153]: time="2024-02-12T20:35:43.094877166Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb pid=3758 runtime=io.containerd.runc.v2 Feb 12 20:35:43.114000 audit[3770]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:43.114000 audit[3770]: SYSCALL arch=c000003e syscall=46 success=yes exit=19508 a0=3 a1=7ffdd6871a70 a2=0 a3=7ffdd6871a5c items=0 ppid=3173 pid=3770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:43.141629 systemd-networkd[1026]: cali14807d3f948: Link UP Feb 12 20:35:43.148638 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14807d3f948: link becomes ready Feb 12 20:35:43.149984 systemd-networkd[1026]: cali14807d3f948: Gained carrier Feb 12 20:35:43.162310 systemd[1]: Started cri-containerd-26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb.scope. Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:42.881 [INFO][3708] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0 coredns-5d78c9869d- kube-system 8a07d73f-80b6-4aa5-b973-9aa8bb72a760 746 0 2024-02-12 20:35:08 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal coredns-5d78c9869d-5t4z6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali14807d3f948 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:42.882 [INFO][3708] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.035 [INFO][3728] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" HandleID="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.059 [INFO][3728] ipam_plugin.go 268: Auto assigning IP ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" HandleID="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bea20), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-5t4z6", "timestamp":"2024-02-12 20:35:43.035808479 +0000 UTC"}, Hostname:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.059 [INFO][3728] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.059 [INFO][3728] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.060 [INFO][3728] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.064 [INFO][3728] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.077 [INFO][3728] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.087 [INFO][3728] ipam.go 489: Trying affinity for 192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.094 [INFO][3728] ipam.go 155: Attempting to load block cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.099 [INFO][3728] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.099 [INFO][3728] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.192/26 handle="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.103 [INFO][3728] ipam.go 1682: Creating new handle: k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948 Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.114 [INFO][3728] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.192/26 handle="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.134 [INFO][3728] ipam.go 1216: Successfully claimed IPs: [192.168.89.196/26] block=192.168.89.192/26 handle="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.134 [INFO][3728] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.196/26] handle="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.134 [INFO][3728] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:43.184837 env[1153]: 2024-02-12 20:35:43.134 [INFO][3728] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.196/26] IPv6=[] ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" HandleID="k8s-pod-network.6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.186067 env[1153]: 2024-02-12 20:35:43.137 [INFO][3708] k8s.go 385: Populated endpoint ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8a07d73f-80b6-4aa5-b973-9aa8bb72a760", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-5t4z6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14807d3f948", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:43.186067 env[1153]: 2024-02-12 20:35:43.137 [INFO][3708] k8s.go 386: Calico CNI using IPs: [192.168.89.196/32] ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.186067 env[1153]: 2024-02-12 20:35:43.137 [INFO][3708] dataplane_linux.go 68: Setting the host side veth name to cali14807d3f948 ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.186067 env[1153]: 2024-02-12 20:35:43.157 [INFO][3708] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.186067 env[1153]: 2024-02-12 20:35:43.160 [INFO][3708] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8a07d73f-80b6-4aa5-b973-9aa8bb72a760", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948", Pod:"coredns-5d78c9869d-5t4z6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14807d3f948", MAC:"0a:d3:01:e6:f7:32", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:43.186067 env[1153]: 2024-02-12 20:35:43.182 [INFO][3708] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948" Namespace="kube-system" Pod="coredns-5d78c9869d-5t4z6" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:43.228922 env[1153]: time="2024-02-12T20:35:43.228839951Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:35:43.229227 env[1153]: time="2024-02-12T20:35:43.229184885Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:35:43.229398 env[1153]: time="2024-02-12T20:35:43.229362838Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:35:43.229869 env[1153]: time="2024-02-12T20:35:43.229805532Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948 pid=3805 runtime=io.containerd.runc.v2 Feb 12 20:35:43.249700 systemd[1]: Started cri-containerd-6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948.scope. Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.267000 audit: BPF prog-id=167 op=LOAD Feb 12 20:35:43.268000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.268000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3758 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236666339333235373437363631343931666337383164363832343338 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3758 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236666339333235373437363631343931666337383164363832343338 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.269000 audit: BPF prog-id=168 op=LOAD Feb 12 20:35:43.269000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c5f60 items=0 ppid=3758 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236666339333235373437363631343931666337383164363832343338 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.271000 audit: BPF prog-id=169 op=LOAD Feb 12 20:35:43.271000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c5fa8 items=0 ppid=3758 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236666339333235373437363631343931666337383164363832343338 Feb 12 20:35:43.272000 audit: BPF prog-id=169 op=UNLOAD Feb 12 20:35:43.272000 audit: BPF prog-id=168 op=UNLOAD Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { perfmon } for pid=3769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit[3769]: AVC avc: denied { bpf } for pid=3769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.272000 audit: BPF prog-id=170 op=LOAD Feb 12 20:35:43.272000 audit[3769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ea3b8 items=0 ppid=3758 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236666339333235373437363631343931666337383164363832343338 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.299000 audit: BPF prog-id=171 op=LOAD Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3805 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661336433313934383232643933343362313065313932616632643135 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3805 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661336433313934383232643933343362313065313932616632643135 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit: BPF prog-id=172 op=LOAD Feb 12 20:35:43.301000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257ce0 items=0 ppid=3805 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661336433313934383232643933343362313065313932616632643135 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.301000 audit: BPF prog-id=173 op=LOAD Feb 12 20:35:43.301000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d28 items=0 ppid=3805 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661336433313934383232643933343362313065313932616632643135 Feb 12 20:35:43.301000 audit: BPF prog-id=173 op=UNLOAD Feb 12 20:35:43.302000 audit: BPF prog-id=172 op=UNLOAD Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { perfmon } for pid=3814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit[3814]: AVC avc: denied { bpf } for pid=3814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.302000 audit: BPF prog-id=174 op=LOAD Feb 12 20:35:43.302000 audit[3814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d8138 items=0 ppid=3805 pid=3814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661336433313934383232643933343362313065313932616632643135 Feb 12 20:35:43.354000 audit[3833]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3833 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:35:43.354000 audit[3833]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffc837158d0 a2=0 a3=7ffc837158bc items=0 ppid=3173 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:35:43.358600 env[1153]: time="2024-02-12T20:35:43.358446462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-58689989f6-kzbtg,Uid:cc9151b7-617f-4846-a392-b04f10598ee4,Namespace:calico-system,Attempt:1,} returns sandbox id \"26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb\"" Feb 12 20:35:43.394833 env[1153]: time="2024-02-12T20:35:43.394772088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5t4z6,Uid:8a07d73f-80b6-4aa5-b973-9aa8bb72a760,Namespace:kube-system,Attempt:1,} returns sandbox id \"6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948\"" Feb 12 20:35:43.400443 env[1153]: time="2024-02-12T20:35:43.400392191Z" level=info msg="CreateContainer within sandbox \"6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:35:43.416662 env[1153]: time="2024-02-12T20:35:43.416593780Z" level=info msg="CreateContainer within sandbox \"6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"fb401ade4696c6b2ee46a218938a7a6840c0abd23be3bdae45050c7b211a5e86\"" Feb 12 20:35:43.420733 env[1153]: time="2024-02-12T20:35:43.420675926Z" level=info msg="StartContainer for \"fb401ade4696c6b2ee46a218938a7a6840c0abd23be3bdae45050c7b211a5e86\"" Feb 12 20:35:43.460536 systemd[1]: Started cri-containerd-fb401ade4696c6b2ee46a218938a7a6840c0abd23be3bdae45050c7b211a5e86.scope. Feb 12 20:35:43.462065 env[1153]: time="2024-02-12T20:35:43.461655973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:43.473065 env[1153]: time="2024-02-12T20:35:43.473016317Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:43.476866 env[1153]: time="2024-02-12T20:35:43.476827799Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:43.480385 env[1153]: time="2024-02-12T20:35:43.480310234Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:43.482126 env[1153]: time="2024-02-12T20:35:43.482086695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:35:43.484285 env[1153]: time="2024-02-12T20:35:43.484247038Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 20:35:43.488410 env[1153]: time="2024-02-12T20:35:43.488306899Z" level=info msg="CreateContainer within sandbox \"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.492000 audit: BPF prog-id=175 op=LOAD Feb 12 20:35:43.494000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.494000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3805 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343031616465343639366336623265653436613231383933386137 Feb 12 20:35:43.496000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.496000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3805 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343031616465343639366336623265653436613231383933386137 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.498000 audit: BPF prog-id=176 op=LOAD Feb 12 20:35:43.498000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255850 items=0 ppid=3805 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343031616465343639366336623265653436613231383933386137 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.500000 audit: BPF prog-id=177 op=LOAD Feb 12 20:35:43.500000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000255898 items=0 ppid=3805 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343031616465343639366336623265653436613231383933386137 Feb 12 20:35:43.501000 audit: BPF prog-id=177 op=UNLOAD Feb 12 20:35:43.501000 audit: BPF prog-id=176 op=UNLOAD Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { perfmon } for pid=3856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit[3856]: AVC avc: denied { bpf } for pid=3856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.502000 audit: BPF prog-id=178 op=LOAD Feb 12 20:35:43.502000 audit[3856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000255ca8 items=0 ppid=3805 pid=3856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662343031616465343639366336623265653436613231383933386137 Feb 12 20:35:43.531825 env[1153]: time="2024-02-12T20:35:43.527985326Z" level=info msg="CreateContainer within sandbox \"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a675eb56be4a27fca6a31fa1636f226f952d2d2de27cc8dd9670fda0f2422608\"" Feb 12 20:35:43.531825 env[1153]: time="2024-02-12T20:35:43.530171879Z" level=info msg="StartContainer for \"a675eb56be4a27fca6a31fa1636f226f952d2d2de27cc8dd9670fda0f2422608\"" Feb 12 20:35:43.531825 env[1153]: time="2024-02-12T20:35:43.531198438Z" level=info msg="StartContainer for \"fb401ade4696c6b2ee46a218938a7a6840c0abd23be3bdae45050c7b211a5e86\" returns successfully" Feb 12 20:35:43.566197 systemd[1]: Started cri-containerd-a675eb56be4a27fca6a31fa1636f226f952d2d2de27cc8dd9670fda0f2422608.scope. Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7efe0113b1d0 items=0 ppid=3554 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373565623536626534613237666361366133316661313633366632 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit: BPF prog-id=179 op=LOAD Feb 12 20:35:43.604000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003233d8 items=0 ppid=3554 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373565623536626534613237666361366133316661313633366632 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit: BPF prog-id=180 op=LOAD Feb 12 20:35:43.604000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000323428 items=0 ppid=3554 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373565623536626534613237666361366133316661313633366632 Feb 12 20:35:43.604000 audit: BPF prog-id=180 op=UNLOAD Feb 12 20:35:43.604000 audit: BPF prog-id=179 op=UNLOAD Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { perfmon } for pid=3891 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit[3891]: AVC avc: denied { bpf } for pid=3891 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:43.604000 audit: BPF prog-id=181 op=LOAD Feb 12 20:35:43.604000 audit[3891]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003234b8 items=0 ppid=3554 pid=3891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373565623536626534613237666361366133316661313633366632 Feb 12 20:35:43.627340 env[1153]: time="2024-02-12T20:35:43.627277231Z" level=info msg="StartContainer for \"a675eb56be4a27fca6a31fa1636f226f952d2d2de27cc8dd9670fda0f2422608\" returns successfully" Feb 12 20:35:43.661164 kubelet[2075]: I0212 20:35:43.661122 2075 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:35:43.661164 kubelet[2075]: I0212 20:35:43.661165 2075 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:35:43.840429 kubelet[2075]: I0212 20:35:43.840388 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-tckwb" podStartSLOduration=26.316020111 podCreationTimestamp="2024-02-12 20:35:14 +0000 UTC" firstStartedPulling="2024-02-12 20:35:39.958738973 +0000 UTC m=+46.716281847" lastFinishedPulling="2024-02-12 20:35:43.483043443 +0000 UTC m=+50.240586326" observedRunningTime="2024-02-12 20:35:43.839838855 +0000 UTC m=+50.597381749" watchObservedRunningTime="2024-02-12 20:35:43.84032459 +0000 UTC m=+50.597867483" Feb 12 20:35:43.881000 audit[3926]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:43.881000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffca52dbe30 a2=0 a3=7ffca52dbe1c items=0 ppid=2262 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:43.887000 audit[3926]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=3926 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:35:43.887000 audit[3926]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffca52dbe30 a2=0 a3=7ffca52dbe1c items=0 ppid=2262 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:43.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:35:44.167602 systemd-networkd[1026]: cali14807d3f948: Gained IPv6LL Feb 12 20:35:44.168000 systemd-networkd[1026]: caliafe9c05041a: Gained IPv6LL Feb 12 20:35:44.531794 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2819317565.mount: Deactivated successfully. Feb 12 20:35:46.657495 env[1153]: time="2024-02-12T20:35:46.657405603Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:46.662823 env[1153]: time="2024-02-12T20:35:46.662781453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:46.667297 env[1153]: time="2024-02-12T20:35:46.667257653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:46.672072 env[1153]: time="2024-02-12T20:35:46.672033231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:35:46.673818 env[1153]: time="2024-02-12T20:35:46.673784722Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 20:35:46.706820 env[1153]: time="2024-02-12T20:35:46.706769624Z" level=info msg="CreateContainer within sandbox \"26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 20:35:46.725514 env[1153]: time="2024-02-12T20:35:46.725399304Z" level=info msg="CreateContainer within sandbox \"26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b2cb2a4de0dba0383cece698df387d0c342e8147b20ba2ad0700642210a95161\"" Feb 12 20:35:46.726298 env[1153]: time="2024-02-12T20:35:46.726260384Z" level=info msg="StartContainer for \"b2cb2a4de0dba0383cece698df387d0c342e8147b20ba2ad0700642210a95161\"" Feb 12 20:35:46.757531 systemd[1]: Started cri-containerd-b2cb2a4de0dba0383cece698df387d0c342e8147b20ba2ad0700642210a95161.scope. Feb 12 20:35:46.792704 kernel: kauditd_printk_skb: 448 callbacks suppressed Feb 12 20:35:46.792827 kernel: audit: type=1400 audit(1707770146.785:1332): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.836542 kernel: audit: type=1400 audit(1707770146.785:1333): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.864722 kernel: audit: type=1400 audit(1707770146.785:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.886542 kernel: audit: type=1400 audit(1707770146.785:1335): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.909118 kernel: audit: type=1400 audit(1707770146.785:1336): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.930582 kernel: audit: type=1400 audit(1707770146.785:1337): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.973094 kernel: audit: type=1400 audit(1707770146.785:1338): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.973247 kernel: audit: type=1400 audit(1707770146.785:1339): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.995507 kernel: audit: type=1400 audit(1707770146.785:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:47.028505 kernel: audit: type=1400 audit(1707770146.812:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:47.033487 env[1153]: time="2024-02-12T20:35:47.033416583Z" level=info msg="StartContainer for \"b2cb2a4de0dba0383cece698df387d0c342e8147b20ba2ad0700642210a95161\" returns successfully" Feb 12 20:35:46.812000 audit: BPF prog-id=182 op=LOAD Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3758 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232636232613464653064626130333833636563653639386466333837 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3758 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232636232613464653064626130333833636563653639386466333837 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.812000 audit: BPF prog-id=183 op=LOAD Feb 12 20:35:46.812000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ac6b0 items=0 ppid=3758 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:46.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232636232613464653064626130333833636563653639386466333837 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit: BPF prog-id=184 op=LOAD Feb 12 20:35:46.835000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ac6f8 items=0 ppid=3758 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:46.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232636232613464653064626130333833636563653639386466333837 Feb 12 20:35:46.835000 audit: BPF prog-id=184 op=UNLOAD Feb 12 20:35:46.835000 audit: BPF prog-id=183 op=UNLOAD Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { perfmon } for pid=3938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit[3938]: AVC avc: denied { bpf } for pid=3938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:35:46.835000 audit: BPF prog-id=185 op=LOAD Feb 12 20:35:46.835000 audit[3938]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003acb08 items=0 ppid=3758 pid=3938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:46.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232636232613464653064626130333833636563653639386466333837 Feb 12 20:35:47.872912 kubelet[2075]: I0212 20:35:47.872317 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-5t4z6" podStartSLOduration=39.87224706 podCreationTimestamp="2024-02-12 20:35:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:35:43.86017936 +0000 UTC m=+50.617722254" watchObservedRunningTime="2024-02-12 20:35:47.87224706 +0000 UTC m=+54.629789954" Feb 12 20:35:47.872912 kubelet[2075]: I0212 20:35:47.872498 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-58689989f6-kzbtg" podStartSLOduration=30.56295081 podCreationTimestamp="2024-02-12 20:35:14 +0000 UTC" firstStartedPulling="2024-02-12 20:35:43.365833196 +0000 UTC m=+50.123376079" lastFinishedPulling="2024-02-12 20:35:46.67530725 +0000 UTC m=+53.432850116" observedRunningTime="2024-02-12 20:35:47.870236457 +0000 UTC m=+54.627779340" watchObservedRunningTime="2024-02-12 20:35:47.872424847 +0000 UTC m=+54.629967741" Feb 12 20:35:47.902888 systemd[1]: run-containerd-runc-k8s.io-b2cb2a4de0dba0383cece698df387d0c342e8147b20ba2ad0700642210a95161-runc.MdbYP4.mount: Deactivated successfully. Feb 12 20:35:50.094000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:50.094000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008326a80 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:35:50.095000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:50.095000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c0084b2d20 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:35:50.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:35:50.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:35:50.102000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:50.102000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0084b3020 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:35:50.102000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:35:50.108000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:50.108000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c010ade940 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:35:50.108000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:35:50.118000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:50.118000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c010ac3c80 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:35:50.118000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:35:50.118000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:50.118000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008327e90 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:35:50.118000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:35:51.045000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:51.045000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002346990 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:51.045000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:51.047000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:51.047000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00275b6a0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:51.047000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:52.730339 systemd[1]: run-containerd-runc-k8s.io-ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281-runc.hehS7n.mount: Deactivated successfully. Feb 12 20:35:53.458957 env[1153]: time="2024-02-12T20:35:53.458897876Z" level=info msg="StopPodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\"" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.503 [WARNING][4031] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8a07d73f-80b6-4aa5-b973-9aa8bb72a760", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948", Pod:"coredns-5d78c9869d-5t4z6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14807d3f948", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.504 [INFO][4031] k8s.go 578: Cleaning up netns ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.504 [INFO][4031] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" iface="eth0" netns="" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.504 [INFO][4031] k8s.go 585: Releasing IP address(es) ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.504 [INFO][4031] utils.go 188: Calico CNI releasing IP address ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.531 [INFO][4037] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.531 [INFO][4037] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.531 [INFO][4037] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.539 [WARNING][4037] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.539 [INFO][4037] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.541 [INFO][4037] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:53.545277 env[1153]: 2024-02-12 20:35:53.542 [INFO][4031] k8s.go 591: Teardown processing complete. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.546435 env[1153]: time="2024-02-12T20:35:53.546362184Z" level=info msg="TearDown network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" successfully" Feb 12 20:35:53.546435 env[1153]: time="2024-02-12T20:35:53.546419319Z" level=info msg="StopPodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" returns successfully" Feb 12 20:35:53.547252 env[1153]: time="2024-02-12T20:35:53.547210191Z" level=info msg="RemovePodSandbox for \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\"" Feb 12 20:35:53.547397 env[1153]: time="2024-02-12T20:35:53.547260356Z" level=info msg="Forcibly stopping sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\"" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.587 [WARNING][4058] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8a07d73f-80b6-4aa5-b973-9aa8bb72a760", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"6a3d3194822d9343b10e192af2d15b2d5cd29e14e499b8779c436308aa1c9948", Pod:"coredns-5d78c9869d-5t4z6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali14807d3f948", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.588 [INFO][4058] k8s.go 578: Cleaning up netns ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.588 [INFO][4058] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" iface="eth0" netns="" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.588 [INFO][4058] k8s.go 585: Releasing IP address(es) ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.588 [INFO][4058] utils.go 188: Calico CNI releasing IP address ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.623 [INFO][4064] ipam_plugin.go 415: Releasing address using handleID ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.623 [INFO][4064] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.623 [INFO][4064] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.631 [WARNING][4064] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.631 [INFO][4064] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" HandleID="k8s-pod-network.6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--5t4z6-eth0" Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.633 [INFO][4064] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:53.635657 env[1153]: 2024-02-12 20:35:53.634 [INFO][4058] k8s.go 591: Teardown processing complete. ContainerID="6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1" Feb 12 20:35:53.636367 env[1153]: time="2024-02-12T20:35:53.636312573Z" level=info msg="TearDown network for sandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" successfully" Feb 12 20:35:53.641714 env[1153]: time="2024-02-12T20:35:53.641667552Z" level=info msg="RemovePodSandbox \"6e679ca609cfc4bb350dd39ebcafda84bf095fe4a14f82e20acefe40ef553cb1\" returns successfully" Feb 12 20:35:53.642239 env[1153]: time="2024-02-12T20:35:53.642191034Z" level=info msg="StopPodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\"" Feb 12 20:35:53.707970 systemd[1]: Started sshd@8-10.128.0.24:22-147.75.109.163:46908.service. Feb 12 20:35:53.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.24:22-147.75.109.163:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:53.713916 kernel: kauditd_printk_skb: 71 callbacks suppressed Feb 12 20:35:53.714047 kernel: audit: type=1130 audit(1707770153.706:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.24:22-147.75.109.163:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.740 [WARNING][4082] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"642c913b-5f51-4318-b6c2-348fa0c076e1", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7", Pod:"csi-node-driver-tckwb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62fd7362e64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.741 [INFO][4082] k8s.go 578: Cleaning up netns ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.741 [INFO][4082] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" iface="eth0" netns="" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.741 [INFO][4082] k8s.go 585: Releasing IP address(es) ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.741 [INFO][4082] utils.go 188: Calico CNI releasing IP address ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.767 [INFO][4092] ipam_plugin.go 415: Releasing address using handleID ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.767 [INFO][4092] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.767 [INFO][4092] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.777 [WARNING][4092] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.777 [INFO][4092] ipam_plugin.go 443: Releasing address using workloadID ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.779 [INFO][4092] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:53.781942 env[1153]: 2024-02-12 20:35:53.780 [INFO][4082] k8s.go 591: Teardown processing complete. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.783087 env[1153]: time="2024-02-12T20:35:53.781965616Z" level=info msg="TearDown network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" successfully" Feb 12 20:35:53.783087 env[1153]: time="2024-02-12T20:35:53.782009280Z" level=info msg="StopPodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" returns successfully" Feb 12 20:35:53.783087 env[1153]: time="2024-02-12T20:35:53.782657804Z" level=info msg="RemovePodSandbox for \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\"" Feb 12 20:35:53.783087 env[1153]: time="2024-02-12T20:35:53.782704068Z" level=info msg="Forcibly stopping sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\"" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.846 [WARNING][4110] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"642c913b-5f51-4318-b6c2-348fa0c076e1", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"549debb220a0c0a500dc550e99fee8e5996c31a86d62c8072134b79819863ea7", Pod:"csi-node-driver-tckwb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali62fd7362e64", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.847 [INFO][4110] k8s.go 578: Cleaning up netns ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.847 [INFO][4110] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" iface="eth0" netns="" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.847 [INFO][4110] k8s.go 585: Releasing IP address(es) ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.847 [INFO][4110] utils.go 188: Calico CNI releasing IP address ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.922 [INFO][4116] ipam_plugin.go 415: Releasing address using handleID ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.922 [INFO][4116] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.922 [INFO][4116] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.930 [WARNING][4116] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.930 [INFO][4116] ipam_plugin.go 443: Releasing address using workloadID ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" HandleID="k8s-pod-network.87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-csi--node--driver--tckwb-eth0" Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.932 [INFO][4116] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:53.934644 env[1153]: 2024-02-12 20:35:53.933 [INFO][4110] k8s.go 591: Teardown processing complete. ContainerID="87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2" Feb 12 20:35:53.935668 env[1153]: time="2024-02-12T20:35:53.935622007Z" level=info msg="TearDown network for sandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" successfully" Feb 12 20:35:53.941092 env[1153]: time="2024-02-12T20:35:53.941036521Z" level=info msg="RemovePodSandbox \"87a46b98038b88141b09047bc86ce2ad15e4c72072e63d4e1c2d86295973cad2\" returns successfully" Feb 12 20:35:53.941880 env[1153]: time="2024-02-12T20:35:53.941837492Z" level=info msg="StopPodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\"" Feb 12 20:35:54.030000 audit[4090]: USER_ACCT pid=4090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.040995 sshd[4090]: Accepted publickey for core from 147.75.109.163 port 46908 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:35:54.062716 kernel: audit: type=1101 audit(1707770154.030:1359): pid=4090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.062326 sshd[4090]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:35:54.061000 audit[4090]: CRED_ACQ pid=4090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.091595 kernel: audit: type=1103 audit(1707770154.061:1360): pid=4090 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.095402 systemd[1]: Started session-8.scope. Feb 12 20:35:54.096761 systemd-logind[1135]: New session 8 of user core. Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.003 [WARNING][4134] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0", GenerateName:"calico-kube-controllers-58689989f6-", Namespace:"calico-system", SelfLink:"", UID:"cc9151b7-617f-4846-a392-b04f10598ee4", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58689989f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb", Pod:"calico-kube-controllers-58689989f6-kzbtg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.89.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliafe9c05041a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.003 [INFO][4134] k8s.go 578: Cleaning up netns ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.003 [INFO][4134] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" iface="eth0" netns="" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.003 [INFO][4134] k8s.go 585: Releasing IP address(es) ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.003 [INFO][4134] utils.go 188: Calico CNI releasing IP address ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.031 [INFO][4140] ipam_plugin.go 415: Releasing address using handleID ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.031 [INFO][4140] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.031 [INFO][4140] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.064 [WARNING][4140] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.064 [INFO][4140] ipam_plugin.go 443: Releasing address using workloadID ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.069 [INFO][4140] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:54.101963 env[1153]: 2024-02-12 20:35:54.092 [INFO][4134] k8s.go 591: Teardown processing complete. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.102882 env[1153]: time="2024-02-12T20:35:54.102835078Z" level=info msg="TearDown network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" successfully" Feb 12 20:35:54.103001 env[1153]: time="2024-02-12T20:35:54.102975736Z" level=info msg="StopPodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" returns successfully" Feb 12 20:35:54.103642 env[1153]: time="2024-02-12T20:35:54.103610233Z" level=info msg="RemovePodSandbox for \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\"" Feb 12 20:35:54.103830 env[1153]: time="2024-02-12T20:35:54.103778355Z" level=info msg="Forcibly stopping sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\"" Feb 12 20:35:54.117591 kernel: audit: type=1006 audit(1707770154.061:1361): pid=4090 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 12 20:35:54.061000 audit[4090]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfbbfc610 a2=3 a3=0 items=0 ppid=1 pid=4090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:54.148492 kernel: audit: type=1300 audit(1707770154.061:1361): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfbbfc610 a2=3 a3=0 items=0 ppid=1 pid=4090 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:54.061000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:35:54.191719 kernel: audit: type=1327 audit(1707770154.061:1361): proctitle=737368643A20636F7265205B707269765D Feb 12 20:35:54.191864 kernel: audit: type=1105 audit(1707770154.113:1362): pid=4090 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.113000 audit[4090]: USER_START pid=4090 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.216246 kernel: audit: type=1103 audit(1707770154.118:1363): pid=4150 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.118000 audit[4150]: CRED_ACQ pid=4150 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.218 [WARNING][4161] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0", GenerateName:"calico-kube-controllers-58689989f6-", Namespace:"calico-system", SelfLink:"", UID:"cc9151b7-617f-4846-a392-b04f10598ee4", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"58689989f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"26fc9325747661491fc781d6824387c822e7b2d67d819abbd36afd2c19c487eb", Pod:"calico-kube-controllers-58689989f6-kzbtg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.89.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliafe9c05041a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.218 [INFO][4161] k8s.go 578: Cleaning up netns ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.218 [INFO][4161] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" iface="eth0" netns="" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.218 [INFO][4161] k8s.go 585: Releasing IP address(es) ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.218 [INFO][4161] utils.go 188: Calico CNI releasing IP address ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.245 [INFO][4167] ipam_plugin.go 415: Releasing address using handleID ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.245 [INFO][4167] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.245 [INFO][4167] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.254 [WARNING][4167] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.254 [INFO][4167] ipam_plugin.go 443: Releasing address using workloadID ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" HandleID="k8s-pod-network.223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--kube--controllers--58689989f6--kzbtg-eth0" Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.256 [INFO][4167] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:54.264390 env[1153]: 2024-02-12 20:35:54.258 [INFO][4161] k8s.go 591: Teardown processing complete. ContainerID="223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b" Feb 12 20:35:54.264390 env[1153]: time="2024-02-12T20:35:54.263939528Z" level=info msg="TearDown network for sandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" successfully" Feb 12 20:35:54.272142 env[1153]: time="2024-02-12T20:35:54.272081460Z" level=info msg="RemovePodSandbox \"223069abc4d16a8346f6bdcb8c467e84ab5876aa048f308a4b09b35d8861577b\" returns successfully" Feb 12 20:35:54.273148 env[1153]: time="2024-02-12T20:35:54.273105249Z" level=info msg="StopPodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\"" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.330 [WARNING][4194] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"475c46cb-68e0-4e36-bf9a-87e71fb55867", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257", Pod:"coredns-5d78c9869d-bh5kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dec4391643", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.331 [INFO][4194] k8s.go 578: Cleaning up netns ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.331 [INFO][4194] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" iface="eth0" netns="" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.331 [INFO][4194] k8s.go 585: Releasing IP address(es) ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.331 [INFO][4194] utils.go 188: Calico CNI releasing IP address ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.371 [INFO][4200] ipam_plugin.go 415: Releasing address using handleID ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.371 [INFO][4200] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.371 [INFO][4200] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.389 [WARNING][4200] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.389 [INFO][4200] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.391 [INFO][4200] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:54.394405 env[1153]: 2024-02-12 20:35:54.392 [INFO][4194] k8s.go 591: Teardown processing complete. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.394405 env[1153]: time="2024-02-12T20:35:54.394367463Z" level=info msg="TearDown network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" successfully" Feb 12 20:35:54.395310 env[1153]: time="2024-02-12T20:35:54.394414186Z" level=info msg="StopPodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" returns successfully" Feb 12 20:35:54.395310 env[1153]: time="2024-02-12T20:35:54.395133861Z" level=info msg="RemovePodSandbox for \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\"" Feb 12 20:35:54.395310 env[1153]: time="2024-02-12T20:35:54.395180086Z" level=info msg="Forcibly stopping sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\"" Feb 12 20:35:54.468352 sshd[4090]: pam_unix(sshd:session): session closed for user core Feb 12 20:35:54.470000 audit[4090]: USER_END pid=4090 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.475003 systemd[1]: sshd@8-10.128.0.24:22-147.75.109.163:46908.service: Deactivated successfully. Feb 12 20:35:54.476195 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 20:35:54.478376 systemd-logind[1135]: Session 8 logged out. Waiting for processes to exit. Feb 12 20:35:54.480661 systemd-logind[1135]: Removed session 8. Feb 12 20:35:54.504523 kernel: audit: type=1106 audit(1707770154.470:1364): pid=4090 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.471000 audit[4090]: CRED_DISP pid=4090 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.534228 kernel: audit: type=1104 audit(1707770154.471:1365): pid=4090 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:54.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.24:22-147.75.109.163:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.457 [WARNING][4218] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"475c46cb-68e0-4e36-bf9a-87e71fb55867", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 35, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"79e695d82a811d92124e795079b573d2df9f7e8953c24ebf97fa26b9e618e257", Pod:"coredns-5d78c9869d-bh5kd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.89.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2dec4391643", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.457 [INFO][4218] k8s.go 578: Cleaning up netns ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.457 [INFO][4218] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" iface="eth0" netns="" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.458 [INFO][4218] k8s.go 585: Releasing IP address(es) ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.458 [INFO][4218] utils.go 188: Calico CNI releasing IP address ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.508 [INFO][4224] ipam_plugin.go 415: Releasing address using handleID ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.509 [INFO][4224] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.509 [INFO][4224] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.519 [WARNING][4224] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.519 [INFO][4224] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" HandleID="k8s-pod-network.2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--bh5kd-eth0" Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.522 [INFO][4224] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:35:54.535133 env[1153]: 2024-02-12 20:35:54.532 [INFO][4218] k8s.go 591: Teardown processing complete. ContainerID="2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03" Feb 12 20:35:54.536279 env[1153]: time="2024-02-12T20:35:54.535176994Z" level=info msg="TearDown network for sandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" successfully" Feb 12 20:35:54.540548 env[1153]: time="2024-02-12T20:35:54.540436408Z" level=info msg="RemovePodSandbox \"2b878be35b4c15a4be1e1aa14d9cc7e4a25b5d1f24cd25e041b016e8d857fc03\" returns successfully" Feb 12 20:35:55.999000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:55.999000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00265efe0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:55.999000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:56.007000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:56.007000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00265f940 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:56.007000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:56.012000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:56.012000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00265fa60 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:56.012000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:56.023000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:35:56.023000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b50be0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:35:56.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:35:59.533527 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 20:35:59.533682 kernel: audit: type=1130 audit(1707770159.513:1371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.24:22-147.75.109.163:46362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:59.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.24:22-147.75.109.163:46362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:35:59.514836 systemd[1]: Started sshd@9-10.128.0.24:22-147.75.109.163:46362.service. Feb 12 20:35:59.813000 audit[4257]: USER_ACCT pid=4257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.846003 kernel: audit: type=1101 audit(1707770159.813:1372): pid=4257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.846116 sshd[4257]: Accepted publickey for core from 147.75.109.163 port 46362 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:35:59.846148 sshd[4257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:35:59.843000 audit[4257]: CRED_ACQ pid=4257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.854345 systemd[1]: Started session-9.scope. Feb 12 20:35:59.855729 systemd-logind[1135]: New session 9 of user core. Feb 12 20:35:59.888874 kernel: audit: type=1103 audit(1707770159.843:1373): pid=4257 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.889056 kernel: audit: type=1006 audit(1707770159.844:1374): pid=4257 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 20:35:59.844000 audit[4257]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e89ff70 a2=3 a3=0 items=0 ppid=1 pid=4257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:59.889710 kernel: audit: type=1300 audit(1707770159.844:1374): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0e89ff70 a2=3 a3=0 items=0 ppid=1 pid=4257 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:35:59.917707 kernel: audit: type=1327 audit(1707770159.844:1374): proctitle=737368643A20636F7265205B707269765D Feb 12 20:35:59.844000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:35:59.865000 audit[4257]: USER_START pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.959247 kernel: audit: type=1105 audit(1707770159.865:1375): pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.868000 audit[4259]: CRED_ACQ pid=4259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:35:59.984577 kernel: audit: type=1103 audit(1707770159.868:1376): pid=4259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:00.122197 sshd[4257]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:00.123000 audit[4257]: USER_END pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:00.157567 kernel: audit: type=1106 audit(1707770160.123:1377): pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:00.156000 audit[4257]: CRED_DISP pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:00.161040 systemd-logind[1135]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:36:00.163307 systemd[1]: sshd@9-10.128.0.24:22-147.75.109.163:46362.service: Deactivated successfully. Feb 12 20:36:00.164546 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:36:00.166594 systemd-logind[1135]: Removed session 9. Feb 12 20:36:00.182508 kernel: audit: type=1104 audit(1707770160.156:1378): pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:00.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.24:22-147.75.109.163:46362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:05.171494 systemd[1]: Started sshd@10-10.128.0.24:22-147.75.109.163:37850.service. Feb 12 20:36:05.202235 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:36:05.202435 kernel: audit: type=1130 audit(1707770165.171:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.24:22-147.75.109.163:37850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:05.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.24:22-147.75.109.163:37850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:05.498747 kernel: audit: type=1101 audit(1707770165.468:1381): pid=4272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.468000 audit[4272]: USER_ACCT pid=4272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.499175 sshd[4272]: Accepted publickey for core from 147.75.109.163 port 37850 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:05.500738 sshd[4272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:05.499000 audit[4272]: CRED_ACQ pid=4272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.527946 kernel: audit: type=1103 audit(1707770165.499:1382): pid=4272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.499000 audit[4272]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe186d6750 a2=3 a3=0 items=0 ppid=1 pid=4272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:05.546353 systemd-logind[1135]: New session 10 of user core. Feb 12 20:36:05.548224 systemd[1]: Started session-10.scope. Feb 12 20:36:05.573336 kernel: audit: type=1006 audit(1707770165.499:1383): pid=4272 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 20:36:05.573514 kernel: audit: type=1300 audit(1707770165.499:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe186d6750 a2=3 a3=0 items=0 ppid=1 pid=4272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:05.573592 kernel: audit: type=1327 audit(1707770165.499:1383): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:05.499000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:05.582896 kernel: audit: type=1105 audit(1707770165.560:1384): pid=4272 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.560000 audit[4272]: USER_START pid=4272 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.562000 audit[4274]: CRED_ACQ pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.639675 kernel: audit: type=1103 audit(1707770165.562:1385): pid=4274 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.824033 sshd[4272]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:05.825000 audit[4272]: USER_END pid=4272 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.828993 systemd-logind[1135]: Session 10 logged out. Waiting for processes to exit. Feb 12 20:36:05.831493 systemd[1]: sshd@10-10.128.0.24:22-147.75.109.163:37850.service: Deactivated successfully. Feb 12 20:36:05.832602 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 20:36:05.834665 systemd-logind[1135]: Removed session 10. Feb 12 20:36:05.825000 audit[4272]: CRED_DISP pid=4272 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.859511 kernel: audit: type=1106 audit(1707770165.825:1386): pid=4272 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.859581 kernel: audit: type=1104 audit(1707770165.825:1387): pid=4272 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:05.871235 systemd[1]: Started sshd@11-10.128.0.24:22-147.75.109.163:37862.service. Feb 12 20:36:05.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.24:22-147.75.109.163:37850 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:05.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.24:22-147.75.109.163:37862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:06.168000 audit[4284]: USER_ACCT pid=4284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:06.169455 sshd[4284]: Accepted publickey for core from 147.75.109.163 port 37862 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:06.170000 audit[4284]: CRED_ACQ pid=4284 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:06.170000 audit[4284]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca797a430 a2=3 a3=0 items=0 ppid=1 pid=4284 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:06.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:06.171899 sshd[4284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:06.179010 systemd[1]: Started session-11.scope. Feb 12 20:36:06.180180 systemd-logind[1135]: New session 11 of user core. Feb 12 20:36:06.187000 audit[4284]: USER_START pid=4284 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:06.190000 audit[4286]: CRED_ACQ pid=4286 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:07.493703 sshd[4284]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:07.496000 audit[4284]: USER_END pid=4284 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:07.496000 audit[4284]: CRED_DISP pid=4284 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:07.500160 systemd[1]: sshd@11-10.128.0.24:22-147.75.109.163:37862.service: Deactivated successfully. Feb 12 20:36:07.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.24:22-147.75.109.163:37862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:07.501415 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 20:36:07.502861 systemd-logind[1135]: Session 11 logged out. Waiting for processes to exit. Feb 12 20:36:07.504449 systemd-logind[1135]: Removed session 11. Feb 12 20:36:07.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.24:22-147.75.109.163:37868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:07.539517 systemd[1]: Started sshd@12-10.128.0.24:22-147.75.109.163:37868.service. Feb 12 20:36:07.830000 audit[4294]: USER_ACCT pid=4294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:07.832253 sshd[4294]: Accepted publickey for core from 147.75.109.163 port 37868 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:07.832000 audit[4294]: CRED_ACQ pid=4294 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:07.833000 audit[4294]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2a285480 a2=3 a3=0 items=0 ppid=1 pid=4294 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:07.833000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:07.835196 sshd[4294]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:07.842101 systemd[1]: Started session-12.scope. Feb 12 20:36:07.842748 systemd-logind[1135]: New session 12 of user core. Feb 12 20:36:07.849000 audit[4294]: USER_START pid=4294 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:07.851000 audit[4296]: CRED_ACQ pid=4296 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:08.129270 sshd[4294]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:08.130000 audit[4294]: USER_END pid=4294 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:08.130000 audit[4294]: CRED_DISP pid=4294 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:08.134291 systemd[1]: sshd@12-10.128.0.24:22-147.75.109.163:37868.service: Deactivated successfully. Feb 12 20:36:08.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.24:22-147.75.109.163:37868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:08.135527 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 20:36:08.136618 systemd-logind[1135]: Session 12 logged out. Waiting for processes to exit. Feb 12 20:36:08.137838 systemd-logind[1135]: Removed session 12. Feb 12 20:36:13.176836 systemd[1]: Started sshd@13-10.128.0.24:22-147.75.109.163:37880.service. Feb 12 20:36:13.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.24:22-147.75.109.163:37880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:13.207811 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 20:36:13.207989 kernel: audit: type=1130 audit(1707770173.177:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.24:22-147.75.109.163:37880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:13.473000 audit[4314]: USER_ACCT pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.503672 kernel: audit: type=1101 audit(1707770173.473:1408): pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.503789 sshd[4314]: Accepted publickey for core from 147.75.109.163 port 37880 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:13.503000 audit[4314]: CRED_ACQ pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.504460 sshd[4314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:13.517568 systemd[1]: Started session-13.scope. Feb 12 20:36:13.519957 systemd-logind[1135]: New session 13 of user core. Feb 12 20:36:13.547281 kernel: audit: type=1103 audit(1707770173.503:1409): pid=4314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.547431 kernel: audit: type=1006 audit(1707770173.503:1410): pid=4314 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 20:36:13.547493 kernel: audit: type=1300 audit(1707770173.503:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff664e37c0 a2=3 a3=0 items=0 ppid=1 pid=4314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:13.503000 audit[4314]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff664e37c0 a2=3 a3=0 items=0 ppid=1 pid=4314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:13.503000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:13.585234 kernel: audit: type=1327 audit(1707770173.503:1410): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:13.525000 audit[4314]: USER_START pid=4314 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.618499 kernel: audit: type=1105 audit(1707770173.525:1411): pid=4314 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.621950 kernel: audit: type=1103 audit(1707770173.530:1412): pid=4316 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.530000 audit[4316]: CRED_ACQ pid=4316 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.789392 sshd[4314]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:13.790000 audit[4314]: USER_END pid=4314 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.824505 kernel: audit: type=1106 audit(1707770173.790:1413): pid=4314 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.790000 audit[4314]: CRED_DISP pid=4314 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:13.826275 systemd[1]: sshd@13-10.128.0.24:22-147.75.109.163:37880.service: Deactivated successfully. Feb 12 20:36:13.827460 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 20:36:13.829670 systemd-logind[1135]: Session 13 logged out. Waiting for processes to exit. Feb 12 20:36:13.831220 systemd-logind[1135]: Removed session 13. Feb 12 20:36:13.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.24:22-147.75.109.163:37880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:13.849540 kernel: audit: type=1104 audit(1707770173.790:1414): pid=4314 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:18.838153 systemd[1]: Started sshd@14-10.128.0.24:22-147.75.109.163:43338.service. Feb 12 20:36:18.871822 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:36:18.871988 kernel: audit: type=1130 audit(1707770178.838:1416): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.24:22-147.75.109.163:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:18.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.24:22-147.75.109.163:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:19.134196 sshd[4332]: Accepted publickey for core from 147.75.109.163 port 43338 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:19.132000 audit[4332]: USER_ACCT pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.136282 sshd[4332]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:19.165508 kernel: audit: type=1101 audit(1707770179.132:1417): pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.134000 audit[4332]: CRED_ACQ pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.195423 systemd-logind[1135]: New session 14 of user core. Feb 12 20:36:19.197308 systemd[1]: Started session-14.scope. Feb 12 20:36:19.208052 kernel: audit: type=1103 audit(1707770179.134:1418): pid=4332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.208171 kernel: audit: type=1006 audit(1707770179.134:1419): pid=4332 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 20:36:19.134000 audit[4332]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7cc9c100 a2=3 a3=0 items=0 ppid=1 pid=4332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:19.237493 kernel: audit: type=1300 audit(1707770179.134:1419): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7cc9c100 a2=3 a3=0 items=0 ppid=1 pid=4332 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:19.134000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:19.248490 kernel: audit: type=1327 audit(1707770179.134:1419): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:19.205000 audit[4332]: USER_START pid=4332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.212000 audit[4335]: CRED_ACQ pid=4335 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.305923 kernel: audit: type=1105 audit(1707770179.205:1420): pid=4332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.306102 kernel: audit: type=1103 audit(1707770179.212:1421): pid=4335 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.524737 sshd[4332]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:19.526000 audit[4332]: USER_END pid=4332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.531881 systemd-logind[1135]: Session 14 logged out. Waiting for processes to exit. Feb 12 20:36:19.534687 systemd[1]: sshd@14-10.128.0.24:22-147.75.109.163:43338.service: Deactivated successfully. Feb 12 20:36:19.535861 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 20:36:19.538035 systemd-logind[1135]: Removed session 14. Feb 12 20:36:19.561499 kernel: audit: type=1106 audit(1707770179.526:1422): pid=4332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.561685 kernel: audit: type=1104 audit(1707770179.527:1423): pid=4332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.527000 audit[4332]: CRED_DISP pid=4332 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:19.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.24:22-147.75.109.163:43338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:22.718099 systemd[1]: run-containerd-runc-k8s.io-ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281-runc.dVYGWY.mount: Deactivated successfully. Feb 12 20:36:24.571959 systemd[1]: Started sshd@15-10.128.0.24:22-147.75.109.163:39910.service. Feb 12 20:36:24.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.24:22-147.75.109.163:39910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:24.578315 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:36:24.578414 kernel: audit: type=1130 audit(1707770184.571:1425): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.24:22-147.75.109.163:39910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:24.864000 audit[4368]: USER_ACCT pid=4368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:24.866120 sshd[4368]: Accepted publickey for core from 147.75.109.163 port 39910 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:24.895556 kernel: audit: type=1101 audit(1707770184.864:1426): pid=4368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:24.895000 audit[4368]: CRED_ACQ pid=4368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:24.897542 sshd[4368]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:24.924051 kernel: audit: type=1103 audit(1707770184.895:1427): pid=4368 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:24.930991 systemd[1]: Started session-15.scope. Feb 12 20:36:24.932990 systemd-logind[1135]: New session 15 of user core. Feb 12 20:36:24.941105 kernel: audit: type=1006 audit(1707770184.895:1428): pid=4368 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 20:36:24.895000 audit[4368]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd91d0d00 a2=3 a3=0 items=0 ppid=1 pid=4368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:24.895000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:24.979292 kernel: audit: type=1300 audit(1707770184.895:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd91d0d00 a2=3 a3=0 items=0 ppid=1 pid=4368 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:24.979454 kernel: audit: type=1327 audit(1707770184.895:1428): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:24.979657 kernel: audit: type=1105 audit(1707770184.941:1429): pid=4368 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:24.941000 audit[4368]: USER_START pid=4368 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:24.945000 audit[4370]: CRED_ACQ pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:25.012491 kernel: audit: type=1103 audit(1707770184.945:1430): pid=4370 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:25.189450 sshd[4368]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:25.191000 audit[4368]: USER_END pid=4368 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:25.195803 systemd[1]: sshd@15-10.128.0.24:22-147.75.109.163:39910.service: Deactivated successfully. Feb 12 20:36:25.197076 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 20:36:25.199828 systemd-logind[1135]: Session 15 logged out. Waiting for processes to exit. Feb 12 20:36:25.201786 systemd-logind[1135]: Removed session 15. Feb 12 20:36:25.191000 audit[4368]: CRED_DISP pid=4368 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:25.225638 kernel: audit: type=1106 audit(1707770185.191:1431): pid=4368 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:25.225702 kernel: audit: type=1104 audit(1707770185.191:1432): pid=4368 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:25.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.24:22-147.75.109.163:39910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:30.266878 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:36:30.267073 kernel: audit: type=1130 audit(1707770190.236:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.24:22-147.75.109.163:39920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:30.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.24:22-147.75.109.163:39920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:30.236569 systemd[1]: Started sshd@16-10.128.0.24:22-147.75.109.163:39920.service. Feb 12 20:36:30.535000 audit[4419]: USER_ACCT pid=4419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.565628 kernel: audit: type=1101 audit(1707770190.535:1435): pid=4419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.565694 sshd[4419]: Accepted publickey for core from 147.75.109.163 port 39920 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:30.566557 sshd[4419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:30.565000 audit[4419]: CRED_ACQ pid=4419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.574686 systemd[1]: Started session-16.scope. Feb 12 20:36:30.576575 systemd-logind[1135]: New session 16 of user core. Feb 12 20:36:30.594203 kernel: audit: type=1103 audit(1707770190.565:1436): pid=4419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.594324 kernel: audit: type=1006 audit(1707770190.565:1437): pid=4419 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 20:36:30.565000 audit[4419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c759e20 a2=3 a3=0 items=0 ppid=1 pid=4419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:30.609513 kernel: audit: type=1300 audit(1707770190.565:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c759e20 a2=3 a3=0 items=0 ppid=1 pid=4419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:30.565000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:30.637579 kernel: audit: type=1327 audit(1707770190.565:1437): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:30.585000 audit[4419]: USER_START pid=4419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.647569 kernel: audit: type=1105 audit(1707770190.585:1438): pid=4419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.679825 kernel: audit: type=1103 audit(1707770190.589:1439): pid=4421 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.589000 audit[4421]: CRED_ACQ pid=4421 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.847152 sshd[4419]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:30.850000 audit[4419]: USER_END pid=4419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.883501 kernel: audit: type=1106 audit(1707770190.850:1440): pid=4419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.850000 audit[4419]: CRED_DISP pid=4419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.885406 systemd-logind[1135]: Session 16 logged out. Waiting for processes to exit. Feb 12 20:36:30.891891 systemd[1]: sshd@16-10.128.0.24:22-147.75.109.163:39920.service: Deactivated successfully. Feb 12 20:36:30.895093 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 20:36:30.897007 systemd-logind[1135]: Removed session 16. Feb 12 20:36:30.906623 systemd[1]: Started sshd@17-10.128.0.24:22-147.75.109.163:39922.service. Feb 12 20:36:30.908522 kernel: audit: type=1104 audit(1707770190.850:1441): pid=4419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:30.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.24:22-147.75.109.163:39920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:30.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.24:22-147.75.109.163:39922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:31.192000 audit[4431]: USER_ACCT pid=4431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.194579 sshd[4431]: Accepted publickey for core from 147.75.109.163 port 39922 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:31.194000 audit[4431]: CRED_ACQ pid=4431 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.195000 audit[4431]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc6c2530 a2=3 a3=0 items=0 ppid=1 pid=4431 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:31.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:31.196200 sshd[4431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:31.202916 systemd-logind[1135]: New session 17 of user core. Feb 12 20:36:31.203319 systemd[1]: Started session-17.scope. Feb 12 20:36:31.211000 audit[4431]: USER_START pid=4431 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.213000 audit[4433]: CRED_ACQ pid=4433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.589573 sshd[4431]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:31.590000 audit[4431]: USER_END pid=4431 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.591000 audit[4431]: CRED_DISP pid=4431 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.594164 systemd[1]: sshd@17-10.128.0.24:22-147.75.109.163:39922.service: Deactivated successfully. Feb 12 20:36:31.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.24:22-147.75.109.163:39922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:31.595281 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 20:36:31.596296 systemd-logind[1135]: Session 17 logged out. Waiting for processes to exit. Feb 12 20:36:31.597956 systemd-logind[1135]: Removed session 17. Feb 12 20:36:31.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.24:22-147.75.109.163:39928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:31.635604 systemd[1]: Started sshd@18-10.128.0.24:22-147.75.109.163:39928.service. Feb 12 20:36:31.923000 audit[4441]: USER_ACCT pid=4441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.923966 sshd[4441]: Accepted publickey for core from 147.75.109.163 port 39928 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:31.925000 audit[4441]: CRED_ACQ pid=4441 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.925000 audit[4441]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe08922cb0 a2=3 a3=0 items=0 ppid=1 pid=4441 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:31.925000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:31.926432 sshd[4441]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:31.933339 systemd[1]: Started session-18.scope. Feb 12 20:36:31.934191 systemd-logind[1135]: New session 18 of user core. Feb 12 20:36:31.942000 audit[4441]: USER_START pid=4441 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:31.944000 audit[4443]: CRED_ACQ pid=4443 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:32.927000 audit[4453]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:32.927000 audit[4453]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd295e8100 a2=0 a3=7ffd295e80ec items=0 ppid=2262 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:32.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:32.929000 audit[4453]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:32.929000 audit[4453]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd295e8100 a2=0 a3=31030 items=0 ppid=2262 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:32.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:32.967775 sshd[4441]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:32.968000 audit[4441]: USER_END pid=4441 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:32.968000 audit[4441]: CRED_DISP pid=4441 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:32.970000 audit[4455]: NETFILTER_CFG table=filter:113 family=2 entries=32 op=nft_register_rule pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:32.970000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc33d3e520 a2=0 a3=7ffc33d3e50c items=0 ppid=2262 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:32.970000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:32.972199 systemd-logind[1135]: Session 18 logged out. Waiting for processes to exit. Feb 12 20:36:32.974674 systemd[1]: sshd@18-10.128.0.24:22-147.75.109.163:39928.service: Deactivated successfully. Feb 12 20:36:32.975829 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 20:36:32.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.24:22-147.75.109.163:39928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:32.973000 audit[4455]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:32.978032 systemd-logind[1135]: Removed session 18. Feb 12 20:36:32.973000 audit[4455]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc33d3e520 a2=0 a3=31030 items=0 ppid=2262 pid=4455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:32.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:33.011308 systemd[1]: Started sshd@19-10.128.0.24:22-147.75.109.163:39936.service. Feb 12 20:36:33.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.24:22-147.75.109.163:39936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:33.306000 audit[4458]: USER_ACCT pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:33.307071 sshd[4458]: Accepted publickey for core from 147.75.109.163 port 39936 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:33.307000 audit[4458]: CRED_ACQ pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:33.308000 audit[4458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9908c780 a2=3 a3=0 items=0 ppid=1 pid=4458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:33.308000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:33.309118 sshd[4458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:33.315597 systemd-logind[1135]: New session 19 of user core. Feb 12 20:36:33.316103 systemd[1]: Started session-19.scope. Feb 12 20:36:33.324000 audit[4458]: USER_START pid=4458 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:33.327000 audit[4460]: CRED_ACQ pid=4460 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.001724 sshd[4458]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:34.003000 audit[4458]: USER_END pid=4458 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.003000 audit[4458]: CRED_DISP pid=4458 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.24:22-147.75.109.163:39936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:34.006001 systemd[1]: sshd@19-10.128.0.24:22-147.75.109.163:39936.service: Deactivated successfully. Feb 12 20:36:34.007296 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 20:36:34.009798 systemd-logind[1135]: Session 19 logged out. Waiting for processes to exit. Feb 12 20:36:34.011927 systemd-logind[1135]: Removed session 19. Feb 12 20:36:34.047702 systemd[1]: Started sshd@20-10.128.0.24:22-147.75.109.163:39944.service. Feb 12 20:36:34.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.24:22-147.75.109.163:39944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:34.337000 audit[4469]: USER_ACCT pid=4469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.338365 sshd[4469]: Accepted publickey for core from 147.75.109.163 port 39944 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:34.339000 audit[4469]: CRED_ACQ pid=4469 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.339000 audit[4469]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6586e990 a2=3 a3=0 items=0 ppid=1 pid=4469 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:34.339000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:34.340317 sshd[4469]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:34.348544 systemd[1]: Started session-20.scope. Feb 12 20:36:34.349560 systemd-logind[1135]: New session 20 of user core. Feb 12 20:36:34.357000 audit[4469]: USER_START pid=4469 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.359000 audit[4471]: CRED_ACQ pid=4471 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.629270 sshd[4469]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:34.631000 audit[4469]: USER_END pid=4469 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.631000 audit[4469]: CRED_DISP pid=4469 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:34.634494 systemd-logind[1135]: Session 20 logged out. Waiting for processes to exit. Feb 12 20:36:34.634688 systemd[1]: sshd@20-10.128.0.24:22-147.75.109.163:39944.service: Deactivated successfully. Feb 12 20:36:34.635887 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 20:36:34.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.24:22-147.75.109.163:39944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:34.637111 systemd-logind[1135]: Removed session 20. Feb 12 20:36:39.244528 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 20:36:39.244730 kernel: audit: type=1325 audit(1707770199.236:1483): table=filter:115 family=2 entries=20 op=nft_register_rule pid=4483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:39.236000 audit[4483]: NETFILTER_CFG table=filter:115 family=2 entries=20 op=nft_register_rule pid=4483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:39.236000 audit[4483]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc92bd7670 a2=0 a3=7ffc92bd765c items=0 ppid=2262 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:39.292879 kernel: audit: type=1300 audit(1707770199.236:1483): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc92bd7670 a2=0 a3=7ffc92bd765c items=0 ppid=2262 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:39.295538 kernel: audit: type=1327 audit(1707770199.236:1483): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:39.236000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:39.310610 kernel: audit: type=1325 audit(1707770199.241:1484): table=nat:116 family=2 entries=104 op=nft_register_chain pid=4483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:39.241000 audit[4483]: NETFILTER_CFG table=nat:116 family=2 entries=104 op=nft_register_chain pid=4483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:39.241000 audit[4483]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc92bd7670 a2=0 a3=7ffc92bd765c items=0 ppid=2262 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:39.325571 kernel: audit: type=1300 audit(1707770199.241:1484): arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc92bd7670 a2=0 a3=7ffc92bd765c items=0 ppid=2262 pid=4483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:39.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:39.377607 kernel: audit: type=1327 audit(1707770199.241:1484): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:39.675432 systemd[1]: Started sshd@21-10.128.0.24:22-147.75.109.163:36350.service. Feb 12 20:36:39.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.24:22-147.75.109.163:36350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:39.701898 kernel: audit: type=1130 audit(1707770199.674:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.24:22-147.75.109.163:36350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:39.967000 audit[4488]: USER_ACCT pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:39.998788 kernel: audit: type=1101 audit(1707770199.967:1486): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:39.998907 sshd[4488]: Accepted publickey for core from 147.75.109.163 port 36350 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:40.000587 sshd[4488]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:39.998000 audit[4488]: CRED_ACQ pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:40.008880 systemd[1]: Started session-21.scope. Feb 12 20:36:40.010593 systemd-logind[1135]: New session 21 of user core. Feb 12 20:36:40.043077 kernel: audit: type=1103 audit(1707770199.998:1487): pid=4488 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:40.043246 kernel: audit: type=1006 audit(1707770199.998:1488): pid=4488 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 20:36:39.998000 audit[4488]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffea2f470 a2=3 a3=0 items=0 ppid=1 pid=4488 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:39.998000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:40.021000 audit[4488]: USER_START pid=4488 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:40.026000 audit[4490]: CRED_ACQ pid=4490 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:40.273105 sshd[4488]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:40.273000 audit[4488]: USER_END pid=4488 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:40.274000 audit[4488]: CRED_DISP pid=4488 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:40.278030 systemd[1]: sshd@21-10.128.0.24:22-147.75.109.163:36350.service: Deactivated successfully. Feb 12 20:36:40.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.24:22-147.75.109.163:36350 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:40.279285 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 20:36:40.280260 systemd-logind[1135]: Session 21 logged out. Waiting for processes to exit. Feb 12 20:36:40.281541 systemd-logind[1135]: Removed session 21. Feb 12 20:36:45.346561 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 20:36:45.346732 kernel: audit: type=1130 audit(1707770205.324:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.24:22-147.75.109.163:58054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:45.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.24:22-147.75.109.163:58054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:45.325621 systemd[1]: Started sshd@22-10.128.0.24:22-147.75.109.163:58054.service. Feb 12 20:36:45.643000 audit[4503]: USER_ACCT pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.647031 sshd[4503]: Accepted publickey for core from 147.75.109.163 port 58054 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:45.673000 audit[4503]: CRED_ACQ pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.675908 sshd[4503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:45.687153 systemd[1]: Started session-22.scope. Feb 12 20:36:45.689106 systemd-logind[1135]: New session 22 of user core. Feb 12 20:36:45.701146 kernel: audit: type=1101 audit(1707770205.643:1495): pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.701267 kernel: audit: type=1103 audit(1707770205.673:1496): pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.673000 audit[4503]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb02562c0 a2=3 a3=0 items=0 ppid=1 pid=4503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:45.748491 kernel: audit: type=1006 audit(1707770205.673:1497): pid=4503 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 20:36:45.748658 kernel: audit: type=1300 audit(1707770205.673:1497): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb02562c0 a2=3 a3=0 items=0 ppid=1 pid=4503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:45.750511 kernel: audit: type=1327 audit(1707770205.673:1497): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:45.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:45.693000 audit[4503]: USER_START pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.790789 kernel: audit: type=1105 audit(1707770205.693:1498): pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.790921 kernel: audit: type=1103 audit(1707770205.698:1499): pid=4505 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.698000 audit[4505]: CRED_ACQ pid=4505 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:45.985983 sshd[4503]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:45.986000 audit[4503]: USER_END pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:46.023497 kernel: audit: type=1106 audit(1707770205.986:1500): pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:46.023588 systemd[1]: sshd@22-10.128.0.24:22-147.75.109.163:58054.service: Deactivated successfully. Feb 12 20:36:46.024835 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 20:36:46.027215 systemd-logind[1135]: Session 22 logged out. Waiting for processes to exit. Feb 12 20:36:46.028779 systemd-logind[1135]: Removed session 22. Feb 12 20:36:45.986000 audit[4503]: CRED_DISP pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:46.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.24:22-147.75.109.163:58054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:46.056647 kernel: audit: type=1104 audit(1707770205.986:1501): pid=4503 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:48.611936 kubelet[2075]: I0212 20:36:48.611877 2075 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:36:48.619807 kubelet[2075]: W0212 20:36:48.619780 2075 reflector.go:533] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' and this object Feb 12 20:36:48.620034 kubelet[2075]: E0212 20:36:48.620018 2075 reflector.go:148] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' and this object Feb 12 20:36:48.622330 systemd[1]: Created slice kubepods-besteffort-pod9ae83048_74c9_4311_b6ec_4f52d37f1bfa.slice. Feb 12 20:36:48.657000 audit[4517]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:48.657000 audit[4517]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd39148900 a2=0 a3=7ffd391488ec items=0 ppid=2262 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:48.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:48.660000 audit[4517]: NETFILTER_CFG table=nat:118 family=2 entries=44 op=nft_register_rule pid=4517 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:48.660000 audit[4517]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd39148900 a2=0 a3=7ffd391488ec items=0 ppid=2262 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:48.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:48.677000 audit[4519]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4519 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:48.677000 audit[4519]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffeb0a3b850 a2=0 a3=7ffeb0a3b83c items=0 ppid=2262 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:48.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:48.680000 audit[4519]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4519 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:48.680000 audit[4519]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffeb0a3b850 a2=0 a3=7ffeb0a3b83c items=0 ppid=2262 pid=4519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:48.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:48.718763 kubelet[2075]: I0212 20:36:48.718705 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jwdgf\" (UniqueName: \"kubernetes.io/projected/9ae83048-74c9-4311-b6ec-4f52d37f1bfa-kube-api-access-jwdgf\") pod \"calico-apiserver-5c9bdf4cbf-75p4z\" (UID: \"9ae83048-74c9-4311-b6ec-4f52d37f1bfa\") " pod="calico-apiserver/calico-apiserver-5c9bdf4cbf-75p4z" Feb 12 20:36:48.718763 kubelet[2075]: I0212 20:36:48.718770 2075 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9ae83048-74c9-4311-b6ec-4f52d37f1bfa-calico-apiserver-certs\") pod \"calico-apiserver-5c9bdf4cbf-75p4z\" (UID: \"9ae83048-74c9-4311-b6ec-4f52d37f1bfa\") " pod="calico-apiserver/calico-apiserver-5c9bdf4cbf-75p4z" Feb 12 20:36:49.828632 env[1153]: time="2024-02-12T20:36:49.828568262Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c9bdf4cbf-75p4z,Uid:9ae83048-74c9-4311-b6ec-4f52d37f1bfa,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:36:50.039081 systemd-networkd[1026]: cali05ade10f335: Link UP Feb 12 20:36:50.049136 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:36:50.058642 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05ade10f335: link becomes ready Feb 12 20:36:50.058350 systemd-networkd[1026]: cali05ade10f335: Gained carrier Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.915 [INFO][4522] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0 calico-apiserver-5c9bdf4cbf- calico-apiserver 9ae83048-74c9-4311-b6ec-4f52d37f1bfa 1129 0 2024-02-12 20:36:48 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5c9bdf4cbf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal calico-apiserver-5c9bdf4cbf-75p4z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali05ade10f335 [] []}} ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.915 [INFO][4522] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.966 [INFO][4533] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" HandleID="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.981 [INFO][4533] ipam_plugin.go 268: Auto assigning IP ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" HandleID="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027caf0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", "pod":"calico-apiserver-5c9bdf4cbf-75p4z", "timestamp":"2024-02-12 20:36:49.966421068 +0000 UTC"}, Hostname:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.981 [INFO][4533] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.981 [INFO][4533] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.981 [INFO][4533] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal' Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.983 [INFO][4533] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.988 [INFO][4533] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.994 [INFO][4533] ipam.go 489: Trying affinity for 192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:49.997 [INFO][4533] ipam.go 155: Attempting to load block cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.002 [INFO][4533] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.192/26 host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.002 [INFO][4533] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.192/26 handle="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.013 [INFO][4533] ipam.go 1682: Creating new handle: k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.019 [INFO][4533] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.192/26 handle="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.027 [INFO][4533] ipam.go 1216: Successfully claimed IPs: [192.168.89.197/26] block=192.168.89.192/26 handle="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.027 [INFO][4533] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.197/26] handle="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" host="ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal" Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.027 [INFO][4533] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:36:50.072421 env[1153]: 2024-02-12 20:36:50.027 [INFO][4533] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.197/26] IPv6=[] ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" HandleID="k8s-pod-network.b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Workload="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.073682 env[1153]: 2024-02-12 20:36:50.030 [INFO][4522] k8s.go 385: Populated endpoint ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0", GenerateName:"calico-apiserver-5c9bdf4cbf-", Namespace:"calico-apiserver", SelfLink:"", UID:"9ae83048-74c9-4311-b6ec-4f52d37f1bfa", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 36, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c9bdf4cbf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-5c9bdf4cbf-75p4z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.89.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali05ade10f335", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:36:50.073682 env[1153]: 2024-02-12 20:36:50.030 [INFO][4522] k8s.go 386: Calico CNI using IPs: [192.168.89.197/32] ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.073682 env[1153]: 2024-02-12 20:36:50.030 [INFO][4522] dataplane_linux.go 68: Setting the host side veth name to cali05ade10f335 ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.073682 env[1153]: 2024-02-12 20:36:50.038 [INFO][4522] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.073682 env[1153]: 2024-02-12 20:36:50.039 [INFO][4522] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0", GenerateName:"calico-apiserver-5c9bdf4cbf-", Namespace:"calico-apiserver", SelfLink:"", UID:"9ae83048-74c9-4311-b6ec-4f52d37f1bfa", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 36, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5c9bdf4cbf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-9039dca3256170a8577c.c.flatcar-212911.internal", ContainerID:"b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e", Pod:"calico-apiserver-5c9bdf4cbf-75p4z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.89.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali05ade10f335", MAC:"56:c6:e9:ce:44:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:36:50.073682 env[1153]: 2024-02-12 20:36:50.065 [INFO][4522] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e" Namespace="calico-apiserver" Pod="calico-apiserver-5c9bdf4cbf-75p4z" WorkloadEndpoint="ci--3510--3--2--9039dca3256170a8577c.c.flatcar--212911.internal-k8s-calico--apiserver--5c9bdf4cbf--75p4z-eth0" Feb 12 20:36:50.098000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:50.098000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00c06f140 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:36:50.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:36:50.098000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:50.098000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00b5f0ff0 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:36:50.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:36:50.103000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521018 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:50.103000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00c06f1d0 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:36:50.103000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:36:50.108898 env[1153]: time="2024-02-12T20:36:50.108807305Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:36:50.109115 env[1153]: time="2024-02-12T20:36:50.109073442Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:36:50.109321 env[1153]: time="2024-02-12T20:36:50.109282119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:36:50.109788 env[1153]: time="2024-02-12T20:36:50.109741722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e pid=4557 runtime=io.containerd.runc.v2 Feb 12 20:36:50.123000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:50.123000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00c06f2f0 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:36:50.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:36:50.123000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:50.123000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c010de75c0 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:36:50.123000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:36:50.127000 audit[1958]: AVC avc: denied { watch } for pid=1958 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:50.127000 audit[1958]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c011001480 a2=fc6 a3=0 items=0 ppid=1791 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c537,c821 key=(null) Feb 12 20:36:50.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3234002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:36:50.145364 systemd[1]: Started cri-containerd-b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e.scope. Feb 12 20:36:50.153000 audit[4583]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=4583 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:36:50.153000 audit[4583]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7ffcceaa8260 a2=0 a3=7ffcceaa824c items=0 ppid=3173 pid=4583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:50.153000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:36:50.174756 systemd[1]: run-containerd-runc-k8s.io-b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e-runc.3CGWLJ.mount: Deactivated successfully. Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.194000 audit: BPF prog-id=186 op=LOAD Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4557 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:50.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313938303262616630313130343862313361333739366539636130 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4557 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:50.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313938303262616630313130343862313361333739366539636130 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit: BPF prog-id=187 op=LOAD Feb 12 20:36:50.195000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000253bc0 items=0 ppid=4557 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:50.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313938303262616630313130343862313361333739366539636130 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit: BPF prog-id=188 op=LOAD Feb 12 20:36:50.195000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000253c08 items=0 ppid=4557 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:50.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313938303262616630313130343862313361333739366539636130 Feb 12 20:36:50.195000 audit: BPF prog-id=188 op=UNLOAD Feb 12 20:36:50.195000 audit: BPF prog-id=187 op=UNLOAD Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { perfmon } for pid=4571 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit[4571]: AVC avc: denied { bpf } for pid=4571 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:50.195000 audit: BPF prog-id=189 op=LOAD Feb 12 20:36:50.195000 audit[4571]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00033a018 items=0 ppid=4557 pid=4571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:50.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238313938303262616630313130343862313361333739366539636130 Feb 12 20:36:50.235773 env[1153]: time="2024-02-12T20:36:50.235717063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5c9bdf4cbf-75p4z,Uid:9ae83048-74c9-4311-b6ec-4f52d37f1bfa,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e\"" Feb 12 20:36:50.244584 kubelet[2075]: E0212 20:36:50.244532 2075 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 12 20:36:50.245334 env[1153]: time="2024-02-12T20:36:50.245296684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:36:51.033310 systemd[1]: Started sshd@23-10.128.0.24:22-147.75.109.163:58058.service. Feb 12 20:36:51.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.24:22-147.75.109.163:58058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:51.064202 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 12 20:36:51.064328 kernel: audit: type=1130 audit(1707770211.033:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.24:22-147.75.109.163:58058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:51.048000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:51.048000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025109e0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:51.129160 kernel: audit: type=1400 audit(1707770211.048:1533): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:51.129354 kernel: audit: type=1300 audit(1707770211.048:1533): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0025109e0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:51.129433 kernel: audit: type=1327 audit(1707770211.048:1533): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:51.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:51.048000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:51.185156 kernel: audit: type=1400 audit(1707770211.048:1534): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521016 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:51.048000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c18bd0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:51.219939 kernel: audit: type=1300 audit(1707770211.048:1534): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c18bd0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:51.220233 kernel: audit: type=1327 audit(1707770211.048:1534): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:51.048000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:51.345000 audit[4601]: USER_ACCT pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.376063 sshd[4601]: Accepted publickey for core from 147.75.109.163 port 58058 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:51.376511 kernel: audit: type=1101 audit(1707770211.345:1535): pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.378073 sshd[4601]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:51.376000 audit[4601]: CRED_ACQ pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.406809 kernel: audit: type=1103 audit(1707770211.376:1536): pid=4601 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.406935 kernel: audit: type=1006 audit(1707770211.377:1537): pid=4601 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 20:36:51.413191 systemd-logind[1135]: New session 23 of user core. Feb 12 20:36:51.414419 systemd[1]: Started session-23.scope. Feb 12 20:36:51.377000 audit[4601]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf2ac6090 a2=3 a3=0 items=0 ppid=1 pid=4601 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:51.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:51.424000 audit[4601]: USER_START pid=4601 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.428000 audit[4603]: CRED_ACQ pid=4603 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.625062 systemd-networkd[1026]: cali05ade10f335: Gained IPv6LL Feb 12 20:36:51.776460 sshd[4601]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:51.779000 audit[4601]: USER_END pid=4601 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.780000 audit[4601]: CRED_DISP pid=4601 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:51.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.24:22-147.75.109.163:58058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:51.783070 systemd[1]: sshd@23-10.128.0.24:22-147.75.109.163:58058.service: Deactivated successfully. Feb 12 20:36:51.784409 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 20:36:51.788164 systemd-logind[1135]: Session 23 logged out. Waiting for processes to exit. Feb 12 20:36:51.790941 systemd-logind[1135]: Removed session 23. Feb 12 20:36:52.731755 systemd[1]: run-containerd-runc-k8s.io-ade369688b1a5a6e6a6291fd6cfc0e6e36a40a4bbd64fcc504eec9dc865ec281-runc.gd8BSt.mount: Deactivated successfully. Feb 12 20:36:53.632823 env[1153]: time="2024-02-12T20:36:53.632763464Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:36:53.635653 env[1153]: time="2024-02-12T20:36:53.635608447Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:36:53.638144 env[1153]: time="2024-02-12T20:36:53.638107064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:36:53.640183 env[1153]: time="2024-02-12T20:36:53.640146581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:36:53.641314 env[1153]: time="2024-02-12T20:36:53.641260413Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:36:53.645410 env[1153]: time="2024-02-12T20:36:53.645325736Z" level=info msg="CreateContainer within sandbox \"b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:36:53.665633 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2442070630.mount: Deactivated successfully. Feb 12 20:36:53.675929 env[1153]: time="2024-02-12T20:36:53.675875247Z" level=info msg="CreateContainer within sandbox \"b819802baf011048b13a3796e9ca0eb2311527d06bcecfb60239f395a66da34e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"24f3b7b2ceef9aeebb86dccb2e7ddbd8d60abcf2cb4c0dd25cc6682d86cac14c\"" Feb 12 20:36:53.676754 env[1153]: time="2024-02-12T20:36:53.676675820Z" level=info msg="StartContainer for \"24f3b7b2ceef9aeebb86dccb2e7ddbd8d60abcf2cb4c0dd25cc6682d86cac14c\"" Feb 12 20:36:53.723680 systemd[1]: Started cri-containerd-24f3b7b2ceef9aeebb86dccb2e7ddbd8d60abcf2cb4c0dd25cc6682d86cac14c.scope. Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.750000 audit: BPF prog-id=190 op=LOAD Feb 12 20:36:53.752000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.752000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4557 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:53.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663362376232636565663961656562623836646363623265376464 Feb 12 20:36:53.752000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.752000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4557 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:53.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663362376232636565663961656562623836646363623265376464 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit: BPF prog-id=191 op=LOAD Feb 12 20:36:53.753000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000236130 items=0 ppid=4557 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:53.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663362376232636565663961656562623836646363623265376464 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit: BPF prog-id=192 op=LOAD Feb 12 20:36:53.753000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000236178 items=0 ppid=4557 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:53.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663362376232636565663961656562623836646363623265376464 Feb 12 20:36:53.753000 audit: BPF prog-id=192 op=UNLOAD Feb 12 20:36:53.753000 audit: BPF prog-id=191 op=UNLOAD Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:36:53.753000 audit: BPF prog-id=193 op=LOAD Feb 12 20:36:53.753000 audit[4643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000236588 items=0 ppid=4557 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:53.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234663362376232636565663961656562623836646363623265376464 Feb 12 20:36:53.817854 env[1153]: time="2024-02-12T20:36:53.817791170Z" level=info msg="StartContainer for \"24f3b7b2ceef9aeebb86dccb2e7ddbd8d60abcf2cb4c0dd25cc6682d86cac14c\" returns successfully" Feb 12 20:36:54.113047 kubelet[2075]: I0212 20:36:54.113009 2075 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5c9bdf4cbf-75p4z" podStartSLOduration=2.7088550810000003 podCreationTimestamp="2024-02-12 20:36:48 +0000 UTC" firstStartedPulling="2024-02-12 20:36:50.237541408 +0000 UTC m=+116.995084279" lastFinishedPulling="2024-02-12 20:36:53.641640542 +0000 UTC m=+120.399183421" observedRunningTime="2024-02-12 20:36:54.106176667 +0000 UTC m=+120.863719560" watchObservedRunningTime="2024-02-12 20:36:54.112954223 +0000 UTC m=+120.870497119" Feb 12 20:36:54.165000 audit[4673]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:54.165000 audit[4673]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc1f3e22e0 a2=0 a3=7ffc1f3e22cc items=0 ppid=2262 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:54.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:54.168000 audit[4673]: NETFILTER_CFG table=nat:123 family=2 entries=44 op=nft_register_rule pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:54.168000 audit[4673]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffc1f3e22e0 a2=0 a3=7ffc1f3e22cc items=0 ppid=2262 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:54.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:54.285000 audit[4675]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:54.285000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd30d07330 a2=0 a3=7ffd30d0731c items=0 ppid=2262 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:54.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:54.293000 audit[4675]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:36:54.293000 audit[4675]: SYSCALL arch=c000003e syscall=46 success=yes exit=14220 a0=3 a1=7ffd30d07330 a2=0 a3=7ffd30d0731c items=0 ppid=2262 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:54.293000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:36:54.729000 audit[4653]: AVC avc: denied { watch } for pid=4653 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_36_49.3341903143/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c493,c498 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c493,c498 tclass=file permissive=0 Feb 12 20:36:54.729000 audit[4653]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006e1660 a2=fc6 a3=0 items=0 ppid=4557 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c493,c498 key=(null) Feb 12 20:36:54.729000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:36:56.000000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:56.000000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002511c60 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:56.000000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:56.008000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:56.008000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002511d80 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:56.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:56.013000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:56.013000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002511ea0 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:56.013000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:56.023000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:36:56.023000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00265f000 a2=fc6 a3=0 items=0 ppid=1803 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c238,c915 key=(null) Feb 12 20:36:56.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:36:56.822072 systemd[1]: Started sshd@24-10.128.0.24:22-147.75.109.163:58888.service. Feb 12 20:36:56.839633 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 12 20:36:56.839830 kernel: audit: type=1130 audit(1707770216.822:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.24:22-147.75.109.163:58888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:56.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.24:22-147.75.109.163:58888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:57.137000 audit[4680]: USER_ACCT pid=4680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.168241 sshd[4680]: Accepted publickey for core from 147.75.109.163 port 58888 ssh2: RSA SHA256:xlSJPj37rpshD+I6cqqeKxL8SH/zhZoYeHdGs1pWqxc Feb 12 20:36:57.168713 kernel: audit: type=1101 audit(1707770217.137:1571): pid=4680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.168000 audit[4680]: CRED_ACQ pid=4680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.195530 kernel: audit: type=1103 audit(1707770217.168:1572): pid=4680 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.170081 sshd[4680]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:36:57.207744 systemd[1]: Started session-24.scope. Feb 12 20:36:57.209612 systemd-logind[1135]: New session 24 of user core. Feb 12 20:36:57.169000 audit[4680]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2bbf6510 a2=3 a3=0 items=0 ppid=1 pid=4680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:57.240649 kernel: audit: type=1006 audit(1707770217.169:1573): pid=4680 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 20:36:57.240781 kernel: audit: type=1300 audit(1707770217.169:1573): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2bbf6510 a2=3 a3=0 items=0 ppid=1 pid=4680 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:36:57.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:57.250443 kernel: audit: type=1327 audit(1707770217.169:1573): proctitle=737368643A20636F7265205B707269765D Feb 12 20:36:57.222000 audit[4680]: USER_START pid=4680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.229000 audit[4706]: CRED_ACQ pid=4706 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.307544 kernel: audit: type=1105 audit(1707770217.222:1574): pid=4680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.307727 kernel: audit: type=1103 audit(1707770217.229:1575): pid=4706 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.480332 sshd[4680]: pam_unix(sshd:session): session closed for user core Feb 12 20:36:57.482000 audit[4680]: USER_END pid=4680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.486282 systemd[1]: sshd@24-10.128.0.24:22-147.75.109.163:58888.service: Deactivated successfully. Feb 12 20:36:57.488053 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 20:36:57.489555 systemd-logind[1135]: Session 24 logged out. Waiting for processes to exit. Feb 12 20:36:57.491103 systemd-logind[1135]: Removed session 24. Feb 12 20:36:57.516556 kernel: audit: type=1106 audit(1707770217.482:1576): pid=4680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.482000 audit[4680]: CRED_DISP pid=4680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:36:57.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.24:22-147.75.109.163:58888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:36:57.543530 kernel: audit: type=1104 audit(1707770217.482:1577): pid=4680 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success'