Feb 12 20:51:39.102456 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:51:39.102495 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:51:39.102512 kernel: BIOS-provided physical RAM map: Feb 12 20:51:39.102525 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 12 20:51:39.102536 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 12 20:51:39.102547 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 12 20:51:39.102566 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 12 20:51:39.102578 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 12 20:51:39.102590 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 12 20:51:39.102602 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 12 20:51:39.102614 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 12 20:51:39.102627 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 12 20:51:39.102640 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 12 20:51:39.102653 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 12 20:51:39.102673 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 12 20:51:39.102686 kernel: NX (Execute Disable) protection: active Feb 12 20:51:39.102699 kernel: efi: EFI v2.70 by EDK II Feb 12 20:51:39.102714 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 12 20:51:39.102728 kernel: random: crng init done Feb 12 20:51:39.102741 kernel: SMBIOS 2.4 present. Feb 12 20:51:39.102754 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 12 20:51:39.102768 kernel: Hypervisor detected: KVM Feb 12 20:51:39.102786 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:51:39.102799 kernel: kvm-clock: cpu 0, msr 156faa001, primary cpu clock Feb 12 20:51:39.102812 kernel: kvm-clock: using sched offset of 12969731117 cycles Feb 12 20:51:39.102826 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:51:39.102838 kernel: tsc: Detected 2299.998 MHz processor Feb 12 20:51:39.102852 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:51:39.102866 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:51:39.102879 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 12 20:51:39.102893 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:51:39.102908 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 12 20:51:39.102926 kernel: Using GB pages for direct mapping Feb 12 20:51:39.102940 kernel: Secure boot disabled Feb 12 20:51:39.102954 kernel: ACPI: Early table checksum verification disabled Feb 12 20:51:39.102968 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 12 20:51:39.102983 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 12 20:51:39.102997 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 12 20:51:39.103010 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 12 20:51:39.103024 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 12 20:51:39.103049 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 12 20:51:39.103066 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 12 20:51:39.103090 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 12 20:51:39.103105 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 12 20:51:39.103120 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 12 20:51:39.103136 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 12 20:51:39.103184 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 12 20:51:39.103200 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 12 20:51:39.103215 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 12 20:51:39.103230 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 12 20:51:39.105192 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 12 20:51:39.105215 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 12 20:51:39.105232 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 12 20:51:39.105249 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 12 20:51:39.105265 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 12 20:51:39.105287 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 20:51:39.105303 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 20:51:39.105319 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 20:51:39.105335 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 12 20:51:39.105350 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 12 20:51:39.105366 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 12 20:51:39.105382 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 12 20:51:39.105398 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 12 20:51:39.105415 kernel: Zone ranges: Feb 12 20:51:39.105436 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:51:39.105452 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 20:51:39.105468 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 12 20:51:39.105484 kernel: Movable zone start for each node Feb 12 20:51:39.105500 kernel: Early memory node ranges Feb 12 20:51:39.105516 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 12 20:51:39.105531 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 12 20:51:39.105548 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 12 20:51:39.105563 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 12 20:51:39.105583 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 12 20:51:39.105599 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 12 20:51:39.105615 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:51:39.105631 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 12 20:51:39.105647 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 12 20:51:39.105663 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 12 20:51:39.105680 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 12 20:51:39.105696 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 12 20:51:39.105711 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:51:39.105732 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:51:39.105748 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:51:39.105764 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:51:39.105780 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:51:39.105797 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:51:39.105813 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:51:39.105828 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 20:51:39.105845 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 12 20:51:39.105860 kernel: Booting paravirtualized kernel on KVM Feb 12 20:51:39.105880 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:51:39.105897 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 20:51:39.105913 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 20:51:39.105929 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 20:51:39.105945 kernel: pcpu-alloc: [0] 0 1 Feb 12 20:51:39.105960 kernel: kvm-guest: PV spinlocks enabled Feb 12 20:51:39.105976 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 20:51:39.105993 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 12 20:51:39.106008 kernel: Policy zone: Normal Feb 12 20:51:39.106030 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:51:39.106048 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:51:39.106064 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 20:51:39.106089 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 20:51:39.106105 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:51:39.106122 kernel: Memory: 7536520K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 12 20:51:39.106138 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 20:51:39.106170 kernel: Kernel/User page tables isolation: enabled Feb 12 20:51:39.106190 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:51:39.106205 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:51:39.106220 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:51:39.106237 kernel: rcu: RCU event tracing is enabled. Feb 12 20:51:39.106252 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 20:51:39.106268 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:51:39.106284 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:51:39.106300 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:51:39.106316 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 20:51:39.106336 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 20:51:39.106365 kernel: Console: colour dummy device 80x25 Feb 12 20:51:39.106382 kernel: printk: console [ttyS0] enabled Feb 12 20:51:39.106404 kernel: ACPI: Core revision 20210730 Feb 12 20:51:39.106422 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:51:39.106440 kernel: x2apic enabled Feb 12 20:51:39.106458 kernel: Switched APIC routing to physical x2apic. Feb 12 20:51:39.106475 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 12 20:51:39.106493 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 12 20:51:39.106511 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 12 20:51:39.106533 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 12 20:51:39.106550 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 12 20:51:39.106568 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:51:39.106584 kernel: Spectre V2 : Mitigation: IBRS Feb 12 20:51:39.106601 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:51:39.106619 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:51:39.106640 kernel: RETBleed: Mitigation: IBRS Feb 12 20:51:39.106658 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 20:51:39.106676 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 12 20:51:39.106693 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 20:51:39.106711 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 20:51:39.106728 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 20:51:39.106745 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 20:51:39.106761 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 20:51:39.106806 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 20:51:39.106826 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 20:51:39.106842 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 20:51:39.106859 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:51:39.106875 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:51:39.106891 kernel: LSM: Security Framework initializing Feb 12 20:51:39.106908 kernel: SELinux: Initializing. Feb 12 20:51:39.106924 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:51:39.106940 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:51:39.106956 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 12 20:51:39.106976 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 20:51:39.106993 kernel: signal: max sigframe size: 1776 Feb 12 20:51:39.107010 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:51:39.107026 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 20:51:39.107042 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:51:39.107058 kernel: x86: Booting SMP configuration: Feb 12 20:51:39.107075 kernel: .... node #0, CPUs: #1 Feb 12 20:51:39.107100 kernel: kvm-clock: cpu 1, msr 156faa041, secondary cpu clock Feb 12 20:51:39.107118 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 12 20:51:39.107139 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 20:51:39.108188 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 20:51:39.108210 kernel: smpboot: Max logical packages: 1 Feb 12 20:51:39.108228 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 12 20:51:39.108246 kernel: devtmpfs: initialized Feb 12 20:51:39.108264 kernel: x86/mm: Memory block size: 128MB Feb 12 20:51:39.108281 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 12 20:51:39.108297 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:51:39.108314 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 20:51:39.108336 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:51:39.108353 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:51:39.108370 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:51:39.108387 kernel: audit: type=2000 audit(1707771097.479:1): state=initialized audit_enabled=0 res=1 Feb 12 20:51:39.108404 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:51:39.108421 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:51:39.108438 kernel: cpuidle: using governor menu Feb 12 20:51:39.108456 kernel: ACPI: bus type PCI registered Feb 12 20:51:39.108473 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:51:39.108494 kernel: dca service started, version 1.12.1 Feb 12 20:51:39.108511 kernel: PCI: Using configuration type 1 for base access Feb 12 20:51:39.108528 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:51:39.108545 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 20:51:39.108561 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:51:39.108577 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:51:39.108593 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:51:39.108610 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:51:39.108626 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:51:39.108646 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:51:39.108663 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:51:39.108680 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:51:39.108696 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 12 20:51:39.108713 kernel: ACPI: Interpreter enabled Feb 12 20:51:39.108730 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:51:39.108747 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:51:39.108764 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:51:39.108780 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 12 20:51:39.108801 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:51:39.109027 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:51:39.111256 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 20:51:39.111287 kernel: PCI host bridge to bus 0000:00 Feb 12 20:51:39.111448 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:51:39.111595 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:51:39.111746 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:51:39.111886 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 12 20:51:39.112027 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:51:39.112231 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:51:39.112402 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 12 20:51:39.112571 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:51:39.112731 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 12 20:51:39.112908 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 12 20:51:39.113067 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 12 20:51:39.113276 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 12 20:51:39.113449 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:51:39.113605 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 12 20:51:39.113765 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 12 20:51:39.113932 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:51:39.114094 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 12 20:51:39.114261 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 12 20:51:39.114282 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:51:39.114300 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:51:39.114317 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:51:39.114334 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:51:39.114351 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:51:39.114372 kernel: iommu: Default domain type: Translated Feb 12 20:51:39.114389 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:51:39.114406 kernel: vgaarb: loaded Feb 12 20:51:39.114423 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:51:39.114441 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:51:39.114458 kernel: PTP clock support registered Feb 12 20:51:39.114474 kernel: Registered efivars operations Feb 12 20:51:39.114492 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:51:39.114509 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:51:39.114529 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 12 20:51:39.114546 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 12 20:51:39.114562 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 12 20:51:39.114578 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 12 20:51:39.114594 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:51:39.114611 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:51:39.114629 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:51:39.114645 kernel: pnp: PnP ACPI init Feb 12 20:51:39.114662 kernel: pnp: PnP ACPI: found 7 devices Feb 12 20:51:39.114683 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:51:39.114700 kernel: NET: Registered PF_INET protocol family Feb 12 20:51:39.114717 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 20:51:39.114734 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 20:51:39.114751 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:51:39.114768 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 20:51:39.114785 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 20:51:39.114802 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 20:51:39.114819 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 20:51:39.114840 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 20:51:39.114856 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:51:39.114873 kernel: NET: Registered PF_XDP protocol family Feb 12 20:51:39.115016 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:51:39.119213 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:51:39.119383 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:51:39.119525 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 12 20:51:39.119692 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:51:39.119722 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:51:39.119740 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 20:51:39.119758 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 12 20:51:39.119775 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 20:51:39.119791 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 12 20:51:39.119807 kernel: clocksource: Switched to clocksource tsc Feb 12 20:51:39.119824 kernel: Initialise system trusted keyrings Feb 12 20:51:39.119839 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 20:51:39.119859 kernel: Key type asymmetric registered Feb 12 20:51:39.119875 kernel: Asymmetric key parser 'x509' registered Feb 12 20:51:39.119890 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:51:39.119907 kernel: io scheduler mq-deadline registered Feb 12 20:51:39.119925 kernel: io scheduler kyber registered Feb 12 20:51:39.119941 kernel: io scheduler bfq registered Feb 12 20:51:39.119957 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:51:39.119972 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:51:39.120170 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 12 20:51:39.120197 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 12 20:51:39.120348 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 12 20:51:39.120368 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:51:39.120512 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 12 20:51:39.120532 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:51:39.120548 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:51:39.120564 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 20:51:39.120580 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 12 20:51:39.120598 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 12 20:51:39.120774 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 12 20:51:39.120797 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:51:39.120813 kernel: i8042: Warning: Keylock active Feb 12 20:51:39.120829 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:51:39.120847 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:51:39.120997 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 12 20:51:39.121165 kernel: rtc_cmos 00:00: registered as rtc0 Feb 12 20:51:39.121314 kernel: rtc_cmos 00:00: setting system clock to 2024-02-12T20:51:38 UTC (1707771098) Feb 12 20:51:39.121455 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 12 20:51:39.121476 kernel: intel_pstate: CPU model not supported Feb 12 20:51:39.121493 kernel: pstore: Registered efi as persistent store backend Feb 12 20:51:39.121511 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:51:39.121537 kernel: Segment Routing with IPv6 Feb 12 20:51:39.121554 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:51:39.121571 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:51:39.121588 kernel: Key type dns_resolver registered Feb 12 20:51:39.121609 kernel: IPI shorthand broadcast: enabled Feb 12 20:51:39.121626 kernel: sched_clock: Marking stable (742212451, 157010509)->(952335482, -53112522) Feb 12 20:51:39.121643 kernel: registered taskstats version 1 Feb 12 20:51:39.121660 kernel: Loading compiled-in X.509 certificates Feb 12 20:51:39.121677 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:51:39.121695 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:51:39.121712 kernel: Key type .fscrypt registered Feb 12 20:51:39.121729 kernel: Key type fscrypt-provisioning registered Feb 12 20:51:39.121746 kernel: pstore: Using crash dump compression: deflate Feb 12 20:51:39.121766 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:51:39.121783 kernel: ima: No architecture policies found Feb 12 20:51:39.121800 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:51:39.121817 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:51:39.121838 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:51:39.121873 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:51:39.121904 kernel: Run /init as init process Feb 12 20:51:39.121920 kernel: with arguments: Feb 12 20:51:39.121941 kernel: /init Feb 12 20:51:39.121957 kernel: with environment: Feb 12 20:51:39.121974 kernel: HOME=/ Feb 12 20:51:39.121988 kernel: TERM=linux Feb 12 20:51:39.122004 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:51:39.122025 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:51:39.122044 systemd[1]: Detected virtualization kvm. Feb 12 20:51:39.122061 systemd[1]: Detected architecture x86-64. Feb 12 20:51:39.122087 systemd[1]: Running in initrd. Feb 12 20:51:39.122114 systemd[1]: No hostname configured, using default hostname. Feb 12 20:51:39.122129 systemd[1]: Hostname set to . Feb 12 20:51:39.122156 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:51:39.122172 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:51:39.122188 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:51:39.122203 systemd[1]: Reached target cryptsetup.target. Feb 12 20:51:39.122218 systemd[1]: Reached target paths.target. Feb 12 20:51:39.122240 systemd[1]: Reached target slices.target. Feb 12 20:51:39.122255 systemd[1]: Reached target swap.target. Feb 12 20:51:39.122271 systemd[1]: Reached target timers.target. Feb 12 20:51:39.122289 systemd[1]: Listening on iscsid.socket. Feb 12 20:51:39.122304 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:51:39.122319 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:51:39.122335 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:51:39.122357 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:51:39.122374 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:51:39.122392 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:51:39.122409 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:51:39.122425 systemd[1]: Reached target sockets.target. Feb 12 20:51:39.122442 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:51:39.122460 systemd[1]: Finished network-cleanup.service. Feb 12 20:51:39.122476 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:51:39.122492 systemd[1]: Starting systemd-journald.service... Feb 12 20:51:39.122514 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:51:39.122530 kernel: audit: type=1334 audit(1707771099.092:2): prog-id=6 op=LOAD Feb 12 20:51:39.122547 systemd[1]: Starting systemd-resolved.service... Feb 12 20:51:39.122582 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:51:39.122604 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:51:39.122622 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:51:39.122644 systemd-journald[189]: Journal started Feb 12 20:51:39.122729 systemd-journald[189]: Runtime Journal (/run/log/journal/f7275ffbeaa97a5fc00ca46c1b392ddd) is 8.0M, max 148.8M, 140.8M free. Feb 12 20:51:39.092000 audit: BPF prog-id=6 op=LOAD Feb 12 20:51:39.122135 systemd-modules-load[190]: Inserted module 'overlay' Feb 12 20:51:39.129210 kernel: audit: type=1130 audit(1707771099.121:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.138953 systemd[1]: Started systemd-journald.service. Feb 12 20:51:39.138997 kernel: audit: type=1130 audit(1707771099.132:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.142789 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:51:39.156450 kernel: audit: type=1130 audit(1707771099.141:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.156483 kernel: audit: type=1130 audit(1707771099.148:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.151085 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:51:39.161795 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:51:39.178623 systemd-resolved[191]: Positive Trust Anchors: Feb 12 20:51:39.179278 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:51:39.179448 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:51:39.184019 systemd-resolved[191]: Defaulting to hostname 'linux'. Feb 12 20:51:39.187267 systemd[1]: Started systemd-resolved.service. Feb 12 20:51:39.187994 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:51:39.188446 systemd[1]: Reached target nss-lookup.target. Feb 12 20:51:39.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.196887 kernel: audit: type=1130 audit(1707771099.186:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.196936 kernel: audit: type=1130 audit(1707771099.187:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.204183 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:51:39.204595 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:51:39.217260 kernel: Bridge firewalling registered Feb 12 20:51:39.217295 kernel: audit: type=1130 audit(1707771099.207:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.207015 systemd-modules-load[190]: Inserted module 'br_netfilter' Feb 12 20:51:39.209584 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:51:39.229370 dracut-cmdline[205]: dracut-dracut-053 Feb 12 20:51:39.236737 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:51:39.245164 kernel: SCSI subsystem initialized Feb 12 20:51:39.264013 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:51:39.264077 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:51:39.266172 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:51:39.270747 systemd-modules-load[190]: Inserted module 'dm_multipath' Feb 12 20:51:39.271732 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:51:39.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.284490 kernel: audit: type=1130 audit(1707771099.279:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.283484 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:51:39.294298 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:51:39.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.326175 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:51:39.340182 kernel: iscsi: registered transport (tcp) Feb 12 20:51:39.364486 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:51:39.364587 kernel: QLogic iSCSI HBA Driver Feb 12 20:51:39.409501 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:51:39.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.414973 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:51:39.472211 kernel: raid6: avx2x4 gen() 18344 MB/s Feb 12 20:51:39.489193 kernel: raid6: avx2x4 xor() 8373 MB/s Feb 12 20:51:39.506188 kernel: raid6: avx2x2 gen() 18401 MB/s Feb 12 20:51:39.524188 kernel: raid6: avx2x2 xor() 18600 MB/s Feb 12 20:51:39.542193 kernel: raid6: avx2x1 gen() 14323 MB/s Feb 12 20:51:39.560190 kernel: raid6: avx2x1 xor() 16187 MB/s Feb 12 20:51:39.578198 kernel: raid6: sse2x4 gen() 11072 MB/s Feb 12 20:51:39.596186 kernel: raid6: sse2x4 xor() 6620 MB/s Feb 12 20:51:39.614202 kernel: raid6: sse2x2 gen() 12016 MB/s Feb 12 20:51:39.631193 kernel: raid6: sse2x2 xor() 7408 MB/s Feb 12 20:51:39.649197 kernel: raid6: sse2x1 gen() 10507 MB/s Feb 12 20:51:39.667460 kernel: raid6: sse2x1 xor() 5201 MB/s Feb 12 20:51:39.667511 kernel: raid6: using algorithm avx2x2 gen() 18401 MB/s Feb 12 20:51:39.667555 kernel: raid6: .... xor() 18600 MB/s, rmw enabled Feb 12 20:51:39.668484 kernel: raid6: using avx2x2 recovery algorithm Feb 12 20:51:39.685191 kernel: xor: automatically using best checksumming function avx Feb 12 20:51:39.791173 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:51:39.802448 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:51:39.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.802000 audit: BPF prog-id=7 op=LOAD Feb 12 20:51:39.802000 audit: BPF prog-id=8 op=LOAD Feb 12 20:51:39.804780 systemd[1]: Starting systemd-udevd.service... Feb 12 20:51:39.820724 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 12 20:51:39.827622 systemd[1]: Started systemd-udevd.service. Feb 12 20:51:39.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.831828 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:51:39.850509 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Feb 12 20:51:39.887230 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:51:39.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:39.888603 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:51:39.954570 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:51:39.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:40.028170 kernel: scsi host0: Virtio SCSI HBA Feb 12 20:51:40.036181 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 12 20:51:40.050171 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 20:51:40.133981 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 12 20:51:40.134302 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 12 20:51:40.137720 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 12 20:51:40.137988 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 12 20:51:40.138220 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 12 20:51:40.149493 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 20:51:40.149551 kernel: AES CTR mode by8 optimization enabled Feb 12 20:51:40.163947 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:51:40.163996 kernel: GPT:17805311 != 25165823 Feb 12 20:51:40.164018 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:51:40.173984 kernel: GPT:17805311 != 25165823 Feb 12 20:51:40.174042 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:51:40.184181 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:51:40.189807 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 12 20:51:40.241208 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:51:40.270408 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (432) Feb 12 20:51:40.269732 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:51:40.284311 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:51:40.300265 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:51:40.327180 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:51:40.340301 systemd[1]: Starting disk-uuid.service... Feb 12 20:51:40.366523 disk-uuid[511]: Primary Header is updated. Feb 12 20:51:40.366523 disk-uuid[511]: Secondary Entries is updated. Feb 12 20:51:40.366523 disk-uuid[511]: Secondary Header is updated. Feb 12 20:51:40.393272 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:51:40.393309 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:51:40.408187 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:51:41.404688 disk-uuid[512]: The operation has completed successfully. Feb 12 20:51:41.413303 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 20:51:41.470466 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:51:41.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.470598 systemd[1]: Finished disk-uuid.service. Feb 12 20:51:41.483393 systemd[1]: Starting verity-setup.service... Feb 12 20:51:41.513327 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 20:51:41.590171 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:51:41.599600 systemd[1]: Finished verity-setup.service. Feb 12 20:51:41.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.615462 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:51:41.716637 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:51:41.716473 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:51:41.723531 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:51:41.724519 systemd[1]: Starting ignition-setup.service... Feb 12 20:51:41.774298 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:51:41.774337 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:51:41.774362 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:51:41.768346 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:51:41.789295 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:51:41.801319 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:51:41.815217 systemd[1]: Finished ignition-setup.service. Feb 12 20:51:41.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.816516 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:51:41.886493 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:51:41.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.886000 audit: BPF prog-id=9 op=LOAD Feb 12 20:51:41.888784 systemd[1]: Starting systemd-networkd.service... Feb 12 20:51:41.922228 systemd-networkd[686]: lo: Link UP Feb 12 20:51:41.922242 systemd-networkd[686]: lo: Gained carrier Feb 12 20:51:41.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.923108 systemd-networkd[686]: Enumeration completed Feb 12 20:51:41.923271 systemd[1]: Started systemd-networkd.service. Feb 12 20:51:41.923618 systemd-networkd[686]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:51:41.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.926131 systemd-networkd[686]: eth0: Link UP Feb 12 20:51:42.007279 iscsid[696]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:51:42.007279 iscsid[696]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 20:51:42.007279 iscsid[696]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:51:42.007279 iscsid[696]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:51:42.007279 iscsid[696]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:51:42.007279 iscsid[696]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:51:42.007279 iscsid[696]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:51:42.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.926139 systemd-networkd[686]: eth0: Gained carrier Feb 12 20:51:42.115248 ignition[614]: Ignition 2.14.0 Feb 12 20:51:42.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:41.929651 systemd[1]: Reached target network.target. Feb 12 20:51:42.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.115263 ignition[614]: Stage: fetch-offline Feb 12 20:51:41.938253 systemd-networkd[686]: eth0: DHCPv4 address 10.128.0.39/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 12 20:51:42.115346 ignition[614]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:41.954453 systemd[1]: Starting iscsiuio.service... Feb 12 20:51:42.115398 ignition[614]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:41.963258 systemd[1]: Started iscsiuio.service. Feb 12 20:51:42.139017 ignition[614]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:41.982584 systemd[1]: Starting iscsid.service... Feb 12 20:51:42.139271 ignition[614]: parsed url from cmdline: "" Feb 12 20:51:42.000475 systemd[1]: Started iscsid.service. Feb 12 20:51:42.139279 ignition[614]: no config URL provided Feb 12 20:51:42.016232 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:51:42.139287 ignition[614]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:51:42.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.033516 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:51:42.139299 ignition[614]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:51:42.057685 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:51:42.139307 ignition[614]: failed to fetch config: resource requires networking Feb 12 20:51:42.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.091316 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:51:42.139486 ignition[614]: Ignition finished successfully Feb 12 20:51:42.091455 systemd[1]: Reached target remote-fs.target. Feb 12 20:51:42.196719 ignition[711]: Ignition 2.14.0 Feb 12 20:51:42.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.092835 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:51:42.196730 ignition[711]: Stage: fetch Feb 12 20:51:42.153768 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:51:42.196864 ignition[711]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:42.168688 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:51:42.196894 ignition[711]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:42.184670 systemd[1]: Starting ignition-fetch.service... Feb 12 20:51:42.204985 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:42.260355 unknown[711]: fetched base config from "system" Feb 12 20:51:42.205237 ignition[711]: parsed url from cmdline: "" Feb 12 20:51:42.260367 unknown[711]: fetched base config from "system" Feb 12 20:51:42.205243 ignition[711]: no config URL provided Feb 12 20:51:42.260373 unknown[711]: fetched user config from "gcp" Feb 12 20:51:42.205250 ignition[711]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:51:42.273767 systemd[1]: Finished ignition-fetch.service. Feb 12 20:51:42.205262 ignition[711]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:51:42.290574 systemd[1]: Starting ignition-kargs.service... Feb 12 20:51:42.205299 ignition[711]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 12 20:51:42.315702 systemd[1]: Finished ignition-kargs.service. Feb 12 20:51:42.214280 ignition[711]: GET result: OK Feb 12 20:51:42.337617 systemd[1]: Starting ignition-disks.service... Feb 12 20:51:42.214370 ignition[711]: parsing config with SHA512: d0110707390595c3a260b98e51d9f03a6a6b41e66ef845f7e0fc665ee0441e87c7c323f18ea3a29023c82975b4a169f0b0b01629bba9b67fa4b61168b76e61a2 Feb 12 20:51:42.367598 systemd[1]: Finished ignition-disks.service. Feb 12 20:51:42.261101 ignition[711]: fetch: fetch complete Feb 12 20:51:42.382544 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:51:42.261107 ignition[711]: fetch: fetch passed Feb 12 20:51:42.397297 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:51:42.261178 ignition[711]: Ignition finished successfully Feb 12 20:51:42.411296 systemd[1]: Reached target local-fs.target. Feb 12 20:51:42.304025 ignition[717]: Ignition 2.14.0 Feb 12 20:51:42.411425 systemd[1]: Reached target sysinit.target. Feb 12 20:51:42.304036 ignition[717]: Stage: kargs Feb 12 20:51:42.430325 systemd[1]: Reached target basic.target. Feb 12 20:51:42.304194 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:42.445498 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:51:42.304231 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:42.311526 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:42.313079 ignition[717]: kargs: kargs passed Feb 12 20:51:42.313129 ignition[717]: Ignition finished successfully Feb 12 20:51:42.348308 ignition[723]: Ignition 2.14.0 Feb 12 20:51:42.348322 ignition[723]: Stage: disks Feb 12 20:51:42.348459 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:42.348489 ignition[723]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:42.356049 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:42.357677 ignition[723]: disks: disks passed Feb 12 20:51:42.357734 ignition[723]: Ignition finished successfully Feb 12 20:51:42.485570 systemd-fsck[731]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 20:51:42.680164 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:51:42.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.689334 systemd[1]: Mounting sysroot.mount... Feb 12 20:51:42.718326 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:51:42.717215 systemd[1]: Mounted sysroot.mount. Feb 12 20:51:42.725466 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:51:42.744614 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:51:42.765781 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:51:42.765860 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:51:42.765903 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:51:42.786590 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:51:42.813100 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:51:42.878419 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (737) Feb 12 20:51:42.878449 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:51:42.878465 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:51:42.878479 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:51:42.878493 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:51:42.850933 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:51:42.873733 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:51:42.902381 initrd-setup-root[758]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:51:42.912274 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:51:42.922472 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:51:42.932281 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:51:42.953670 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:51:42.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:42.954885 systemd[1]: Starting ignition-mount.service... Feb 12 20:51:42.976248 systemd[1]: Starting sysroot-boot.service... Feb 12 20:51:42.990517 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 20:51:42.990649 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 20:51:43.017411 ignition[803]: INFO : Ignition 2.14.0 Feb 12 20:51:43.017411 ignition[803]: INFO : Stage: mount Feb 12 20:51:43.017411 ignition[803]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:43.017411 ignition[803]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:43.017411 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:43.142290 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (812) Feb 12 20:51:43.142330 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:51:43.142355 kernel: BTRFS info (device sda6): using free space tree Feb 12 20:51:43.142378 kernel: BTRFS info (device sda6): has skinny extents Feb 12 20:51:43.142400 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 12 20:51:43.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:43.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:43.013888 systemd[1]: Finished sysroot-boot.service. Feb 12 20:51:43.150303 ignition[803]: INFO : mount: mount passed Feb 12 20:51:43.150303 ignition[803]: INFO : Ignition finished successfully Feb 12 20:51:43.025523 systemd[1]: Finished ignition-mount.service. Feb 12 20:51:43.042304 systemd[1]: Starting ignition-files.service... Feb 12 20:51:43.052203 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:51:43.188321 ignition[831]: INFO : Ignition 2.14.0 Feb 12 20:51:43.188321 ignition[831]: INFO : Stage: files Feb 12 20:51:43.188321 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:43.188321 ignition[831]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:43.188321 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:43.188321 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:51:43.188321 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:51:43.188321 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:51:43.188321 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:51:43.188321 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:51:43.188321 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:51:43.188321 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:51:43.188321 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 20:51:43.112833 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:51:43.166732 unknown[831]: wrote ssh authorized keys file for user: core Feb 12 20:51:43.495288 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:51:43.614509 systemd-networkd[686]: eth0: Gained IPv6LL Feb 12 20:51:43.725417 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 20:51:43.749299 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:51:43.749299 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:51:43.749299 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 20:51:44.061016 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:51:44.187262 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:51:44.215305 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (831) Feb 12 20:51:44.212989 systemd[1]: mnt-oem1402549288.mount: Deactivated successfully. Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402549288" Feb 12 20:51:44.224294 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402549288": device or resource busy Feb 12 20:51:44.224294 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1402549288", trying btrfs: device or resource busy Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402549288" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1402549288" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem1402549288" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem1402549288" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:51:44.224294 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:51:44.424309 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Feb 12 20:51:44.522032 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 20:51:44.546313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:51:44.546313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:51:44.546313 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubectl: attempt #1 Feb 12 20:51:44.604862 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Feb 12 20:51:44.874334 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 97840854134909d75a1a2563628cc4ba632067369ce7fc8a8a1e90a387d32dd7bfd73f4f5b5a82ef842088e7470692951eb7fc869c5f297dd740f855672ee628 Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895626128" Feb 12 20:51:44.898284 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895626128": device or resource busy Feb 12 20:51:44.898284 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1895626128", trying btrfs: device or resource busy Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895626128" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1895626128" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem1895626128" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem1895626128" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:51:44.898284 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:51:44.891009 systemd[1]: mnt-oem1895626128.mount: Deactivated successfully. Feb 12 20:51:45.121288 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Feb 12 20:51:45.134790 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 20:51:45.158295 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:51:45.158295 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:51:45.158295 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:51:45.158295 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Feb 12 20:51:45.707647 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:51:45.731322 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3408461561" Feb 12 20:51:46.210322 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 12 20:51:46.210375 kernel: audit: type=1130 audit(1707771105.761:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.210412 kernel: audit: type=1130 audit(1707771105.853:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.210437 kernel: audit: type=1130 audit(1707771105.918:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.210459 kernel: audit: type=1131 audit(1707771105.918:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.210480 kernel: audit: type=1130 audit(1707771106.018:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.210495 kernel: audit: type=1131 audit(1707771106.018:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.210509 kernel: audit: type=1130 audit(1707771106.172:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.728541 systemd[1]: mnt-oem3408461561.mount: Deactivated successfully. Feb 12 20:51:46.226326 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3408461561": device or resource busy Feb 12 20:51:46.226326 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3408461561", trying btrfs: device or resource busy Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3408461561" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3408461561" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem3408461561" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem3408461561" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem242740890" Feb 12 20:51:46.226326 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem242740890": device or resource busy Feb 12 20:51:46.226326 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem242740890", trying btrfs: device or resource busy Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem242740890" Feb 12 20:51:46.226326 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem242740890" Feb 12 20:51:46.560347 kernel: audit: type=1131 audit(1707771106.298:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.750182 systemd[1]: Finished ignition-files.service. Feb 12 20:51:46.575588 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem242740890" Feb 12 20:51:46.575588 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem242740890" Feb 12 20:51:46.575588 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(20): [started] processing unit "oem-gce.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Feb 12 20:51:46.575588 ignition[831]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:51:46.995296 kernel: audit: type=1131 audit(1707771106.616:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.995347 kernel: audit: type=1131 audit(1707771106.678:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.771616 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:51:47.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.013354 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:51:47.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.035474 iscsid[696]: iscsid shutting down. Feb 12 20:51:47.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(28): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(28): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(29): [started] setting preset to enabled for "oem-gce.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(29): [finished] setting preset to enabled for "oem-gce.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2a): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2a): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2c): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2c): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2d): [started] setting preset to enabled for "prepare-helm.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: op(2d): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 20:51:47.050344 ignition[831]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:51:47.050344 ignition[831]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:51:47.050344 ignition[831]: INFO : files: files passed Feb 12 20:51:47.050344 ignition[831]: INFO : Ignition finished successfully Feb 12 20:51:47.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.817302 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:51:47.401000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:51:45.818398 systemd[1]: Starting ignition-quench.service... Feb 12 20:51:45.833792 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:51:47.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.854856 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:51:47.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.854994 systemd[1]: Finished ignition-quench.service. Feb 12 20:51:47.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:45.919599 systemd[1]: Reached target ignition-complete.target. Feb 12 20:51:45.975538 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:51:47.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.493428 ignition[869]: INFO : Ignition 2.14.0 Feb 12 20:51:47.493428 ignition[869]: INFO : Stage: umount Feb 12 20:51:47.493428 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:51:47.493428 ignition[869]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 12 20:51:47.493428 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 12 20:51:47.493428 ignition[869]: INFO : umount: umount passed Feb 12 20:51:47.493428 ignition[869]: INFO : Ignition finished successfully Feb 12 20:51:47.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.016756 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:51:47.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.016867 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:51:47.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:47.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:46.019661 systemd[1]: Reached target initrd-fs.target. Feb 12 20:51:46.081522 systemd[1]: Reached target initrd.target. Feb 12 20:51:46.123555 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:51:46.124882 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:51:46.148568 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:51:46.174756 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:51:47.710285 systemd-journald[189]: Received SIGTERM from PID 1 (systemd). Feb 12 20:51:46.226284 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:51:46.226659 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:51:46.251697 systemd[1]: Stopped target timers.target. Feb 12 20:51:46.277635 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:51:46.277817 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:51:46.299840 systemd[1]: Stopped target initrd.target. Feb 12 20:51:46.362665 systemd[1]: Stopped target basic.target. Feb 12 20:51:46.377658 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:51:46.399654 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:51:46.445627 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:51:46.462724 systemd[1]: Stopped target remote-fs.target. Feb 12 20:51:46.487694 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:51:46.514683 systemd[1]: Stopped target sysinit.target. Feb 12 20:51:46.538703 systemd[1]: Stopped target local-fs.target. Feb 12 20:51:46.568637 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:51:46.583621 systemd[1]: Stopped target swap.target. Feb 12 20:51:46.597624 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:51:46.597808 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:51:46.617918 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:51:46.661597 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:51:46.661788 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:51:46.679835 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:51:46.680135 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:51:46.727747 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:51:46.727923 systemd[1]: Stopped ignition-files.service. Feb 12 20:51:46.757176 systemd[1]: Stopping ignition-mount.service... Feb 12 20:51:46.781848 systemd[1]: Stopping iscsid.service... Feb 12 20:51:46.805309 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:51:46.805591 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:51:46.832855 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:51:46.856287 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:51:46.856559 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:51:46.876532 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:51:46.876696 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:51:46.899083 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:51:46.900015 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:51:46.900130 systemd[1]: Stopped iscsid.service. Feb 12 20:51:46.920015 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:51:46.920120 systemd[1]: Stopped ignition-mount.service. Feb 12 20:51:46.944841 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:51:46.944944 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:51:46.962895 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:51:46.963065 systemd[1]: Stopped ignition-disks.service. Feb 12 20:51:46.973479 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:51:46.973539 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:51:47.003432 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 20:51:47.003491 systemd[1]: Stopped ignition-fetch.service. Feb 12 20:51:47.021430 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:51:47.021492 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:51:47.043421 systemd[1]: Stopped target paths.target. Feb 12 20:51:47.057259 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:51:47.061225 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:51:47.087438 systemd[1]: Stopped target slices.target. Feb 12 20:51:47.108455 systemd[1]: Stopped target sockets.target. Feb 12 20:51:47.128536 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:51:47.128592 systemd[1]: Closed iscsid.socket. Feb 12 20:51:47.146499 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:51:47.146569 systemd[1]: Stopped ignition-setup.service. Feb 12 20:51:47.163605 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:51:47.163671 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:51:47.183695 systemd[1]: Stopping iscsiuio.service... Feb 12 20:51:47.203884 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:51:47.204021 systemd[1]: Stopped iscsiuio.service. Feb 12 20:51:47.221851 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:51:47.221977 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:51:47.240506 systemd[1]: Stopped target network.target. Feb 12 20:51:47.258483 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:51:47.258545 systemd[1]: Closed iscsiuio.socket. Feb 12 20:51:47.276661 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:51:47.280238 systemd-networkd[686]: eth0: DHCPv6 lease lost Feb 12 20:51:47.719000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:51:47.301536 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:51:47.314826 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:51:47.314968 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:51:47.357285 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:51:47.357430 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:51:47.363988 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:51:47.364036 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:51:47.386280 systemd[1]: Stopping network-cleanup.service... Feb 12 20:51:47.409260 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:51:47.409361 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:51:47.423407 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:51:47.423522 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:51:47.439529 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:51:47.439591 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:51:47.455546 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:51:47.470843 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:51:47.471673 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:51:47.471828 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:51:47.486838 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:51:47.486927 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:51:47.501455 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:51:47.501506 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:51:47.508476 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:51:47.508535 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:51:47.521536 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:51:47.521594 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:51:47.538570 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:51:47.538635 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:51:47.564580 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:51:47.589283 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:51:47.589392 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:51:47.596967 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:51:47.597105 systemd[1]: Stopped network-cleanup.service. Feb 12 20:51:47.619847 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:51:47.619959 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:51:47.635622 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:51:47.651383 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:51:47.673363 systemd[1]: Switching root. Feb 12 20:51:47.721863 systemd-journald[189]: Journal stopped Feb 12 20:51:52.267378 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:51:52.267543 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:51:52.267569 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:51:52.267591 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:51:52.267606 kernel: SELinux: policy capability open_perms=1 Feb 12 20:51:52.267623 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:51:52.267638 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:51:52.267652 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:51:52.267666 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:51:52.267680 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:51:52.267700 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:51:52.267716 systemd[1]: Successfully loaded SELinux policy in 111.358ms. Feb 12 20:51:52.267754 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.081ms. Feb 12 20:51:52.267776 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:51:52.267792 systemd[1]: Detected virtualization kvm. Feb 12 20:51:52.267807 systemd[1]: Detected architecture x86-64. Feb 12 20:51:52.267821 systemd[1]: Detected first boot. Feb 12 20:51:52.267836 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:51:52.267852 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:51:52.267870 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:51:52.267886 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:51:52.267912 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:51:52.267929 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:51:52.267945 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 12 20:51:52.267960 kernel: audit: type=1334 audit(1707771111.390:89): prog-id=12 op=LOAD Feb 12 20:51:52.267974 kernel: audit: type=1334 audit(1707771111.390:90): prog-id=3 op=UNLOAD Feb 12 20:51:52.267988 kernel: audit: type=1334 audit(1707771111.396:91): prog-id=13 op=LOAD Feb 12 20:51:52.268005 kernel: audit: type=1334 audit(1707771111.403:92): prog-id=14 op=LOAD Feb 12 20:51:52.268018 kernel: audit: type=1334 audit(1707771111.403:93): prog-id=4 op=UNLOAD Feb 12 20:51:52.268032 kernel: audit: type=1334 audit(1707771111.403:94): prog-id=5 op=UNLOAD Feb 12 20:51:52.268046 kernel: audit: type=1334 audit(1707771111.410:95): prog-id=15 op=LOAD Feb 12 20:51:52.268060 kernel: audit: type=1334 audit(1707771111.410:96): prog-id=12 op=UNLOAD Feb 12 20:51:52.268073 kernel: audit: type=1334 audit(1707771111.445:97): prog-id=16 op=LOAD Feb 12 20:51:52.268087 kernel: audit: type=1334 audit(1707771111.452:98): prog-id=17 op=LOAD Feb 12 20:51:52.268101 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:51:52.268116 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:51:52.268135 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:51:52.268169 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:51:52.268192 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:51:52.268208 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 20:51:52.268224 systemd[1]: Created slice system-getty.slice. Feb 12 20:51:52.268238 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:51:52.268255 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:51:52.268281 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:51:52.268296 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:51:52.268311 systemd[1]: Created slice user.slice. Feb 12 20:51:52.268326 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:51:52.268341 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:51:52.268358 systemd[1]: Set up automount boot.automount. Feb 12 20:51:52.268373 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:51:52.268388 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:51:52.268403 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:51:52.268421 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:51:52.268436 systemd[1]: Reached target integritysetup.target. Feb 12 20:51:52.268450 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:51:52.268465 systemd[1]: Reached target remote-fs.target. Feb 12 20:51:52.268479 systemd[1]: Reached target slices.target. Feb 12 20:51:52.268494 systemd[1]: Reached target swap.target. Feb 12 20:51:52.268508 systemd[1]: Reached target torcx.target. Feb 12 20:51:52.268523 systemd[1]: Reached target veritysetup.target. Feb 12 20:51:52.268537 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:51:52.268552 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:51:52.268570 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:51:52.268585 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:51:52.268600 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:51:52.268614 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:51:52.268629 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:51:52.268643 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:51:52.268657 systemd[1]: Mounting media.mount... Feb 12 20:51:52.268672 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:51:52.268687 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:51:52.268704 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:51:52.268719 systemd[1]: Mounting tmp.mount... Feb 12 20:51:52.268733 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:51:52.268749 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:51:52.268763 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:51:52.268777 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:51:52.268792 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:51:52.268806 systemd[1]: Starting modprobe@drm.service... Feb 12 20:51:52.268821 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:51:52.268839 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:51:52.268853 systemd[1]: Starting modprobe@loop.service... Feb 12 20:51:52.268867 kernel: fuse: init (API version 7.34) Feb 12 20:51:52.268886 kernel: loop: module loaded Feb 12 20:51:52.268901 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:51:52.268915 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:51:52.268931 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:51:52.268946 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:51:52.268960 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:51:52.268978 systemd[1]: Stopped systemd-journald.service. Feb 12 20:51:52.268992 systemd[1]: Starting systemd-journald.service... Feb 12 20:51:52.269011 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:51:52.269035 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:51:52.269056 systemd-journald[993]: Journal started Feb 12 20:51:52.269120 systemd-journald[993]: Runtime Journal (/run/log/journal/f7275ffbeaa97a5fc00ca46c1b392ddd) is 8.0M, max 148.8M, 140.8M free. Feb 12 20:51:48.009000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:51:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:51:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:51:48.164000 audit: BPF prog-id=10 op=LOAD Feb 12 20:51:48.164000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:51:48.164000 audit: BPF prog-id=11 op=LOAD Feb 12 20:51:48.164000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:51:48.312000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:51:48.312000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8ac a1=c0000cede0 a2=c0000d7ac0 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:51:48.312000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:51:48.322000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:51:48.322000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d985 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:51:48.322000 audit: CWD cwd="/" Feb 12 20:51:48.322000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:48.322000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:48.322000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:51:51.390000 audit: BPF prog-id=12 op=LOAD Feb 12 20:51:51.390000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:51:51.396000 audit: BPF prog-id=13 op=LOAD Feb 12 20:51:51.403000 audit: BPF prog-id=14 op=LOAD Feb 12 20:51:51.403000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:51:51.403000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:51:51.410000 audit: BPF prog-id=15 op=LOAD Feb 12 20:51:51.410000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:51:51.445000 audit: BPF prog-id=16 op=LOAD Feb 12 20:51:51.452000 audit: BPF prog-id=17 op=LOAD Feb 12 20:51:51.452000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:51:51.452000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:51:51.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:51.480000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:51:51.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:51.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.221000 audit: BPF prog-id=18 op=LOAD Feb 12 20:51:52.221000 audit: BPF prog-id=19 op=LOAD Feb 12 20:51:52.221000 audit: BPF prog-id=20 op=LOAD Feb 12 20:51:52.221000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:51:52.221000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:51:52.263000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:51:52.263000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffef49a9770 a2=4000 a3=7ffef49a980c items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:51:52.263000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:51:48.308918 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:51:51.389981 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:51:48.310086 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:51:51.455308 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:51:48.310109 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:51:48.310171 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:51:48.310192 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:51:48.310238 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:51:48.310255 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:51:48.310476 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:51:48.310531 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:51:48.310548 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:51:48.311924 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:51:48.312001 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:51:48.312037 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:51:48.312066 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:51:48.312097 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:51:48.312123 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:48Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:51:50.797471 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:51:50.797767 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:51:50.797894 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:51:50.798120 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:51:50.798213 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:51:50.798292 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2024-02-12T20:51:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:51:52.278192 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:51:52.293181 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:51:52.308171 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:51:52.314187 systemd[1]: Stopped verity-setup.service. Feb 12 20:51:52.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.334304 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:51:52.343220 systemd[1]: Started systemd-journald.service. Feb 12 20:51:52.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.351574 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:51:52.359479 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:51:52.366464 systemd[1]: Mounted media.mount. Feb 12 20:51:52.373452 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:51:52.382444 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:51:52.391390 systemd[1]: Mounted tmp.mount. Feb 12 20:51:52.398556 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:51:52.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.407603 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:51:52.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.416767 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:51:52.417004 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:51:52.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.425713 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:51:52.425927 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:51:52.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.434694 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:51:52.434896 systemd[1]: Finished modprobe@drm.service. Feb 12 20:51:52.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.443677 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:51:52.443877 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:51:52.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.452703 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:51:52.452922 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:51:52.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.461622 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:51:52.461814 systemd[1]: Finished modprobe@loop.service. Feb 12 20:51:52.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.470666 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:51:52.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.479572 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:51:52.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.488652 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:51:52.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.497604 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:51:52.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.506982 systemd[1]: Reached target network-pre.target. Feb 12 20:51:52.516654 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:51:52.526554 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:51:52.534283 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:51:52.537103 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:51:52.545921 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:51:52.554307 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:51:52.555937 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:51:52.563322 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:51:52.565004 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:51:52.569529 systemd-journald[993]: Time spent on flushing to /var/log/journal/f7275ffbeaa97a5fc00ca46c1b392ddd is 42.786ms for 1185 entries. Feb 12 20:51:52.569529 systemd-journald[993]: System Journal (/var/log/journal/f7275ffbeaa97a5fc00ca46c1b392ddd) is 8.0M, max 584.8M, 576.8M free. Feb 12 20:51:52.652079 systemd-journald[993]: Received client request to flush runtime journal. Feb 12 20:51:52.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.580124 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:51:52.588826 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:51:52.599657 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:51:52.654249 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 20:51:52.608437 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:51:52.617664 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:51:52.627671 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:51:52.639877 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:51:52.653385 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:51:52.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:52.662921 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:51:52.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.229815 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:51:53.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.237000 audit: BPF prog-id=21 op=LOAD Feb 12 20:51:53.237000 audit: BPF prog-id=22 op=LOAD Feb 12 20:51:53.238000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:51:53.238000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:51:53.240098 systemd[1]: Starting systemd-udevd.service... Feb 12 20:51:53.262505 systemd-udevd[1010]: Using default interface naming scheme 'v252'. Feb 12 20:51:53.316819 systemd[1]: Started systemd-udevd.service. Feb 12 20:51:53.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.326000 audit: BPF prog-id=23 op=LOAD Feb 12 20:51:53.328806 systemd[1]: Starting systemd-networkd.service... Feb 12 20:51:53.341000 audit: BPF prog-id=24 op=LOAD Feb 12 20:51:53.341000 audit: BPF prog-id=25 op=LOAD Feb 12 20:51:53.341000 audit: BPF prog-id=26 op=LOAD Feb 12 20:51:53.343987 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:51:53.395434 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:51:53.428280 systemd[1]: Started systemd-userdbd.service. Feb 12 20:51:53.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.556235 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1027) Feb 12 20:51:53.570296 systemd-networkd[1024]: lo: Link UP Feb 12 20:51:53.570309 systemd-networkd[1024]: lo: Gained carrier Feb 12 20:51:53.571032 systemd-networkd[1024]: Enumeration completed Feb 12 20:51:53.571193 systemd[1]: Started systemd-networkd.service. Feb 12 20:51:53.572436 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:51:53.574494 systemd-networkd[1024]: eth0: Link UP Feb 12 20:51:53.574511 systemd-networkd[1024]: eth0: Gained carrier Feb 12 20:51:53.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.583314 systemd-networkd[1024]: eth0: DHCPv4 address 10.128.0.39/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 12 20:51:53.613191 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:51:53.632228 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:51:53.666170 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 12 20:51:53.673197 kernel: ACPI: button: Sleep Button [SLPF] Feb 12 20:51:53.676192 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:51:53.677449 kernel: EDAC MC: Ver: 3.0.0 Feb 12 20:51:53.644000 audit[1020]: AVC avc: denied { confidentiality } for pid=1020 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:51:53.644000 audit[1020]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=565117dbe880 a1=32194 a2=7f21ec981bc5 a3=5 items=108 ppid=1010 pid=1020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:51:53.644000 audit: CWD cwd="/" Feb 12 20:51:53.644000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=1 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=2 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=3 name=(null) inode=14206 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=4 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=5 name=(null) inode=14207 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=6 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=7 name=(null) inode=14208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=8 name=(null) inode=14208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=9 name=(null) inode=14209 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=10 name=(null) inode=14208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=11 name=(null) inode=14210 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=12 name=(null) inode=14208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=13 name=(null) inode=14211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=14 name=(null) inode=14208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=15 name=(null) inode=14212 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=16 name=(null) inode=14208 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=17 name=(null) inode=14213 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=18 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=19 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=20 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=21 name=(null) inode=14215 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=22 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=23 name=(null) inode=14216 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=24 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=25 name=(null) inode=14217 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=26 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=27 name=(null) inode=14218 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=28 name=(null) inode=14214 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=29 name=(null) inode=14219 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=30 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=31 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=32 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=33 name=(null) inode=14221 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=34 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=35 name=(null) inode=14222 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=36 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=37 name=(null) inode=14223 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=38 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=39 name=(null) inode=14224 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=40 name=(null) inode=14220 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=41 name=(null) inode=14225 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=42 name=(null) inode=14205 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=43 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=44 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=45 name=(null) inode=14227 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=46 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=47 name=(null) inode=14228 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=48 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=49 name=(null) inode=14229 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=50 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=51 name=(null) inode=14230 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=52 name=(null) inode=14226 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=53 name=(null) inode=14231 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=55 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=56 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=57 name=(null) inode=14233 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=58 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=59 name=(null) inode=14234 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=60 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=61 name=(null) inode=14235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=62 name=(null) inode=14235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=63 name=(null) inode=14236 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=64 name=(null) inode=14235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=65 name=(null) inode=14237 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=66 name=(null) inode=14235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=67 name=(null) inode=14238 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=68 name=(null) inode=14235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=69 name=(null) inode=14239 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=70 name=(null) inode=14235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=71 name=(null) inode=14240 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=72 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=73 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=74 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=75 name=(null) inode=14242 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=76 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=77 name=(null) inode=14243 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=78 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=79 name=(null) inode=14244 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=80 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=81 name=(null) inode=14245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=82 name=(null) inode=14241 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=83 name=(null) inode=14246 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=84 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=85 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=86 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=87 name=(null) inode=14248 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=88 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=89 name=(null) inode=14249 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=90 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=91 name=(null) inode=14250 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=92 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=93 name=(null) inode=14251 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=94 name=(null) inode=14247 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=95 name=(null) inode=14252 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=96 name=(null) inode=14232 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=97 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=98 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=99 name=(null) inode=14254 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=100 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=101 name=(null) inode=14255 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=102 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=103 name=(null) inode=14256 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=104 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=105 name=(null) inode=14257 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=106 name=(null) inode=14253 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PATH item=107 name=(null) inode=14258 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:51:53.644000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:51:53.702186 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 12 20:51:53.720296 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 20:51:53.720903 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:51:53.730188 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:51:53.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.736821 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:51:53.763260 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:51:53.788452 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:51:53.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.797443 systemd[1]: Reached target cryptsetup.target. Feb 12 20:51:53.807668 systemd[1]: Starting lvm2-activation.service... Feb 12 20:51:53.813768 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:51:53.841478 systemd[1]: Finished lvm2-activation.service. Feb 12 20:51:53.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.850537 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:51:53.859268 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:51:53.859314 systemd[1]: Reached target local-fs.target. Feb 12 20:51:53.867275 systemd[1]: Reached target machines.target. Feb 12 20:51:53.876759 systemd[1]: Starting ldconfig.service... Feb 12 20:51:53.884211 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:51:53.884305 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:51:53.886044 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:51:53.894577 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:51:53.906082 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:51:53.916292 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:51:53.916369 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:51:53.917894 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:51:53.929875 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) Feb 12 20:51:53.931773 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:51:53.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:53.944635 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:51:53.968899 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:51:53.978700 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:51:53.989271 systemd-tmpfiles[1053]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:51:54.073944 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Feb 12 20:51:54.073944 systemd-fsck[1058]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 20:51:54.076916 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:51:54.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.089971 systemd[1]: Mounting boot.mount... Feb 12 20:51:54.170881 systemd[1]: Mounted boot.mount. Feb 12 20:51:54.195969 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:51:54.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.295117 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:51:54.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.306076 systemd[1]: Starting audit-rules.service... Feb 12 20:51:54.314722 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:51:54.322691 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 12 20:51:54.333121 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:51:54.343000 audit: BPF prog-id=27 op=LOAD Feb 12 20:51:54.345753 systemd[1]: Starting systemd-resolved.service... Feb 12 20:51:54.354000 audit: BPF prog-id=28 op=LOAD Feb 12 20:51:54.357229 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:51:54.365995 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:51:54.374000 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:51:54.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.382946 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:51:54.442048 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 12 20:51:54.442313 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 12 20:51:54.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.461000 audit[1080]: SYSTEM_BOOT pid=1080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.468294 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:51:54.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:51:54.515000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:51:54.515000 audit[1093]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd083b9070 a2=420 a3=0 items=0 ppid=1062 pid=1093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:51:54.515000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:51:54.518128 augenrules[1093]: No rules Feb 12 20:51:54.519041 systemd[1]: Finished audit-rules.service. Feb 12 20:51:54.525646 systemd-timesyncd[1078]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 12 20:51:54.526337 systemd-timesyncd[1078]: Initial clock synchronization to Mon 2024-02-12 20:51:54.151845 UTC. Feb 12 20:51:54.526430 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:51:54.536005 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:51:54.546564 systemd[1]: Reached target time-set.target. Feb 12 20:51:54.548755 systemd-resolved[1076]: Positive Trust Anchors: Feb 12 20:51:54.548772 systemd-resolved[1076]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:51:54.548810 systemd-resolved[1076]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:51:54.657595 systemd-resolved[1076]: Defaulting to hostname 'linux'. Feb 12 20:51:54.660172 systemd[1]: Started systemd-resolved.service. Feb 12 20:51:54.668369 systemd[1]: Reached target network.target. Feb 12 20:51:54.677259 systemd[1]: Reached target nss-lookup.target. Feb 12 20:51:54.698414 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:51:54.877385 systemd-networkd[1024]: eth0: Gained IPv6LL Feb 12 20:51:55.012929 systemd[1]: Finished ldconfig.service. Feb 12 20:51:55.022069 systemd[1]: Starting systemd-update-done.service... Feb 12 20:51:55.031506 systemd[1]: Finished systemd-update-done.service. Feb 12 20:51:55.040657 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:51:55.041408 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:51:55.049409 systemd[1]: Reached target sysinit.target. Feb 12 20:51:55.057358 systemd[1]: Started motdgen.path. Feb 12 20:51:55.064324 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:51:55.074490 systemd[1]: Started logrotate.timer. Feb 12 20:51:55.081416 systemd[1]: Started mdadm.timer. Feb 12 20:51:55.088242 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:51:55.096260 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:51:55.096327 systemd[1]: Reached target paths.target. Feb 12 20:51:55.103227 systemd[1]: Reached target timers.target. Feb 12 20:51:55.110575 systemd[1]: Listening on dbus.socket. Feb 12 20:51:55.118537 systemd[1]: Starting docker.socket... Feb 12 20:51:55.128907 systemd[1]: Listening on sshd.socket. Feb 12 20:51:55.135382 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:51:55.136016 systemd[1]: Listening on docker.socket. Feb 12 20:51:55.143405 systemd[1]: Reached target sockets.target. Feb 12 20:51:55.151226 systemd[1]: Reached target basic.target. Feb 12 20:51:55.158312 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:51:55.158357 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:51:55.159823 systemd[1]: Starting containerd.service... Feb 12 20:51:55.167521 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:51:55.176907 systemd[1]: Starting dbus.service... Feb 12 20:51:55.184459 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:51:55.194015 systemd[1]: Starting extend-filesystems.service... Feb 12 20:51:55.201279 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:51:55.202882 systemd[1]: Starting motdgen.service... Feb 12 20:51:55.211909 systemd[1]: Starting oem-gce.service... Feb 12 20:51:55.217933 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:51:55.220731 jq[1110]: false Feb 12 20:51:55.226790 systemd[1]: Starting prepare-critools.service... Feb 12 20:51:55.235888 systemd[1]: Starting prepare-helm.service... Feb 12 20:51:55.244750 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:51:55.252876 systemd[1]: Starting sshd-keygen.service... Feb 12 20:51:55.266234 systemd[1]: Starting systemd-logind.service... Feb 12 20:51:55.273316 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:51:55.273418 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 12 20:51:55.274119 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:51:55.275300 systemd[1]: Starting update-engine.service... Feb 12 20:51:55.282601 extend-filesystems[1111]: Found sda Feb 12 20:51:55.284408 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:51:55.290489 jq[1135]: true Feb 12 20:51:55.293370 extend-filesystems[1111]: Found sda1 Feb 12 20:51:55.304263 extend-filesystems[1111]: Found sda2 Feb 12 20:51:55.304263 extend-filesystems[1111]: Found sda3 Feb 12 20:51:55.304263 extend-filesystems[1111]: Found usr Feb 12 20:51:55.304263 extend-filesystems[1111]: Found sda4 Feb 12 20:51:55.304263 extend-filesystems[1111]: Found sda6 Feb 12 20:51:55.304263 extend-filesystems[1111]: Found sda7 Feb 12 20:51:55.304263 extend-filesystems[1111]: Found sda9 Feb 12 20:51:55.304263 extend-filesystems[1111]: Checking size of /dev/sda9 Feb 12 20:51:55.302898 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:51:55.303446 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:51:55.303976 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:51:55.304254 systemd[1]: Finished motdgen.service. Feb 12 20:51:55.380630 tar[1139]: ./ Feb 12 20:51:55.380630 tar[1139]: ./macvlan Feb 12 20:51:55.313505 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:51:55.313944 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:51:55.381972 mkfs.ext4[1146]: mke2fs 1.46.5 (30-Dec-2021) Feb 12 20:51:55.381972 mkfs.ext4[1146]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 12 20:51:55.381972 mkfs.ext4[1146]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 12 20:51:55.381972 mkfs.ext4[1146]: Filesystem UUID: d1a5984a-b7cd-4f60-8e51-a9b102110410 Feb 12 20:51:55.381972 mkfs.ext4[1146]: Superblock backups stored on blocks: Feb 12 20:51:55.381972 mkfs.ext4[1146]: 32768, 98304, 163840, 229376 Feb 12 20:51:55.381972 mkfs.ext4[1146]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:51:55.381972 mkfs.ext4[1146]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:51:55.381972 mkfs.ext4[1146]: Creating journal (8192 blocks): done Feb 12 20:51:55.381972 mkfs.ext4[1146]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 12 20:51:55.382806 jq[1144]: true Feb 12 20:51:55.387727 dbus-daemon[1109]: [system] SELinux support is enabled Feb 12 20:51:55.387945 systemd[1]: Started dbus.service. Feb 12 20:51:55.399862 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:51:55.399933 systemd[1]: Reached target system-config.target. Feb 12 20:51:55.407445 umount[1158]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 12 20:51:55.407638 dbus-daemon[1109]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1024 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 12 20:51:55.408695 extend-filesystems[1111]: Resized partition /dev/sda9 Feb 12 20:51:55.435005 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 12 20:51:55.428346 dbus-daemon[1109]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 20:51:55.436535 extend-filesystems[1160]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:51:55.456314 kernel: loop0: detected capacity change from 0 to 2097152 Feb 12 20:51:55.409332 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:51:55.456748 update_engine[1133]: I0212 20:51:55.452126 1133 main.cc:92] Flatcar Update Engine starting Feb 12 20:51:55.409365 systemd[1]: Reached target user-config.target. Feb 12 20:51:55.436115 systemd[1]: Starting systemd-hostnamed.service... Feb 12 20:51:55.462334 update_engine[1133]: I0212 20:51:55.462078 1133 update_check_scheduler.cc:74] Next update check in 7m37s Feb 12 20:51:55.462132 systemd[1]: Started update-engine.service. Feb 12 20:51:55.472980 tar[1140]: crictl Feb 12 20:51:55.472775 systemd[1]: Started locksmithd.service. Feb 12 20:51:55.478895 tar[1141]: linux-amd64/helm Feb 12 20:51:55.496166 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 12 20:51:55.534353 extend-filesystems[1160]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 12 20:51:55.534353 extend-filesystems[1160]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 12 20:51:55.534353 extend-filesystems[1160]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 12 20:51:55.572438 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:51:55.523311 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:51:55.572650 extend-filesystems[1111]: Resized filesystem in /dev/sda9 Feb 12 20:51:55.599125 env[1145]: time="2024-02-12T20:51:55.537355190Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:51:55.599534 bash[1180]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:51:55.523561 systemd[1]: Finished extend-filesystems.service. Feb 12 20:51:55.565223 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:51:55.701315 dbus-daemon[1109]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 12 20:51:55.701525 systemd[1]: Started systemd-hostnamed.service. Feb 12 20:51:55.702169 dbus-daemon[1109]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1163 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 12 20:51:55.712894 systemd[1]: Starting polkit.service... Feb 12 20:51:55.767223 tar[1139]: ./static Feb 12 20:51:55.772675 coreos-metadata[1108]: Feb 12 20:51:55.772 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 12 20:51:55.783175 coreos-metadata[1108]: Feb 12 20:51:55.777 INFO Fetch failed with 404: resource not found Feb 12 20:51:55.783175 coreos-metadata[1108]: Feb 12 20:51:55.777 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 12 20:51:55.783175 coreos-metadata[1108]: Feb 12 20:51:55.780 INFO Fetch successful Feb 12 20:51:55.783175 coreos-metadata[1108]: Feb 12 20:51:55.780 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 12 20:51:55.783175 coreos-metadata[1108]: Feb 12 20:51:55.782 INFO Fetch failed with 404: resource not found Feb 12 20:51:55.783175 coreos-metadata[1108]: Feb 12 20:51:55.782 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 12 20:51:55.783546 coreos-metadata[1108]: Feb 12 20:51:55.783 INFO Fetch failed with 404: resource not found Feb 12 20:51:55.783546 coreos-metadata[1108]: Feb 12 20:51:55.783 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 12 20:51:55.784547 coreos-metadata[1108]: Feb 12 20:51:55.784 INFO Fetch successful Feb 12 20:51:55.788953 unknown[1108]: wrote ssh authorized keys file for user: core Feb 12 20:51:55.812528 systemd-logind[1131]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:51:55.812577 systemd-logind[1131]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 12 20:51:55.812607 systemd-logind[1131]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:51:55.816565 systemd-logind[1131]: New seat seat0. Feb 12 20:51:55.839367 update-ssh-keys[1189]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:51:55.840022 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 20:51:55.849887 systemd[1]: Started systemd-logind.service. Feb 12 20:51:55.852390 env[1145]: time="2024-02-12T20:51:55.852332083Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:51:55.852558 env[1145]: time="2024-02-12T20:51:55.852528327Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:51:55.860372 env[1145]: time="2024-02-12T20:51:55.860323148Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:51:55.860372 env[1145]: time="2024-02-12T20:51:55.860371304Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:51:55.860733 env[1145]: time="2024-02-12T20:51:55.860693855Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:51:55.860828 env[1145]: time="2024-02-12T20:51:55.860735215Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:51:55.860828 env[1145]: time="2024-02-12T20:51:55.860756364Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:51:55.860828 env[1145]: time="2024-02-12T20:51:55.860771514Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:51:55.860965 env[1145]: time="2024-02-12T20:51:55.860888321Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:51:55.861237 env[1145]: time="2024-02-12T20:51:55.861209197Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:51:55.861482 env[1145]: time="2024-02-12T20:51:55.861445923Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:51:55.861559 env[1145]: time="2024-02-12T20:51:55.861482621Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:51:55.861608 env[1145]: time="2024-02-12T20:51:55.861559856Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:51:55.861608 env[1145]: time="2024-02-12T20:51:55.861578504Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:51:55.893317 env[1145]: time="2024-02-12T20:51:55.893220881Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:51:55.893465 env[1145]: time="2024-02-12T20:51:55.893323888Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:51:55.893465 env[1145]: time="2024-02-12T20:51:55.893376131Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:51:55.893465 env[1145]: time="2024-02-12T20:51:55.893443699Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893614 env[1145]: time="2024-02-12T20:51:55.893470013Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893614 env[1145]: time="2024-02-12T20:51:55.893550306Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893614 env[1145]: time="2024-02-12T20:51:55.893574580Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893758 env[1145]: time="2024-02-12T20:51:55.893615953Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893758 env[1145]: time="2024-02-12T20:51:55.893638644Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893758 env[1145]: time="2024-02-12T20:51:55.893661582Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893758 env[1145]: time="2024-02-12T20:51:55.893707999Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.893758 env[1145]: time="2024-02-12T20:51:55.893730091Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:51:55.893975 env[1145]: time="2024-02-12T20:51:55.893915710Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:51:55.894128 env[1145]: time="2024-02-12T20:51:55.894101235Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:51:55.894719 env[1145]: time="2024-02-12T20:51:55.894685449Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:51:55.894826 env[1145]: time="2024-02-12T20:51:55.894753525Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.894826 env[1145]: time="2024-02-12T20:51:55.894777969Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:51:55.894917 env[1145]: time="2024-02-12T20:51:55.894881127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895025 env[1145]: time="2024-02-12T20:51:55.894999529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895086 env[1145]: time="2024-02-12T20:51:55.895032767Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895086 env[1145]: time="2024-02-12T20:51:55.895052885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895226 env[1145]: time="2024-02-12T20:51:55.895091731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895226 env[1145]: time="2024-02-12T20:51:55.895112904Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895226 env[1145]: time="2024-02-12T20:51:55.895134339Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895226 env[1145]: time="2024-02-12T20:51:55.895180106Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895226 env[1145]: time="2024-02-12T20:51:55.895204912Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:51:55.895463 env[1145]: time="2024-02-12T20:51:55.895421757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895463 env[1145]: time="2024-02-12T20:51:55.895447813Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895559 env[1145]: time="2024-02-12T20:51:55.895489378Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.895559 env[1145]: time="2024-02-12T20:51:55.895512313Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:51:55.895651 env[1145]: time="2024-02-12T20:51:55.895538005Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:51:55.895651 env[1145]: time="2024-02-12T20:51:55.895573809Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:51:55.895651 env[1145]: time="2024-02-12T20:51:55.895608995Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:51:55.895791 env[1145]: time="2024-02-12T20:51:55.895673384Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:51:55.896174 env[1145]: time="2024-02-12T20:51:55.896058123Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.896190337Z" level=info msg="Connect containerd service" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.896264129Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.897991240Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.898093420Z" level=info msg="Start subscribing containerd event" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.898190423Z" level=info msg="Start recovering state" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.898277156Z" level=info msg="Start event monitor" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.898298733Z" level=info msg="Start snapshots syncer" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.898312259Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:51:55.899490 env[1145]: time="2024-02-12T20:51:55.898323021Z" level=info msg="Start streaming server" Feb 12 20:51:55.900370 env[1145]: time="2024-02-12T20:51:55.900337782Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:51:55.922921 env[1145]: time="2024-02-12T20:51:55.922865183Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:51:55.923476 polkitd[1188]: Started polkitd version 121 Feb 12 20:51:55.942191 systemd[1]: Started containerd.service. Feb 12 20:51:55.942946 env[1145]: time="2024-02-12T20:51:55.942893635Z" level=info msg="containerd successfully booted in 0.406402s" Feb 12 20:51:55.964301 polkitd[1188]: Loading rules from directory /etc/polkit-1/rules.d Feb 12 20:51:55.964396 polkitd[1188]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 12 20:51:55.969182 polkitd[1188]: Finished loading, compiling and executing 2 rules Feb 12 20:51:55.969901 dbus-daemon[1109]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 12 20:51:55.970122 systemd[1]: Started polkit.service. Feb 12 20:51:55.970982 polkitd[1188]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 12 20:51:56.033088 systemd-hostnamed[1163]: Hostname set to (transient) Feb 12 20:51:56.036490 systemd-resolved[1076]: System hostname changed to 'ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal'. Feb 12 20:51:56.050578 tar[1139]: ./vlan Feb 12 20:51:56.236734 tar[1139]: ./portmap Feb 12 20:51:56.387758 tar[1139]: ./host-local Feb 12 20:51:56.508061 tar[1139]: ./vrf Feb 12 20:51:56.646844 tar[1139]: ./bridge Feb 12 20:51:56.768959 systemd[1]: Finished prepare-critools.service. Feb 12 20:51:56.794004 tar[1139]: ./tuning Feb 12 20:51:56.897133 tar[1139]: ./firewall Feb 12 20:51:57.016016 tar[1139]: ./host-device Feb 12 20:51:57.126780 tar[1139]: ./sbr Feb 12 20:51:57.167020 tar[1141]: linux-amd64/LICENSE Feb 12 20:51:57.167492 tar[1141]: linux-amd64/README.md Feb 12 20:51:57.175627 systemd[1]: Finished prepare-helm.service. Feb 12 20:51:57.229197 tar[1139]: ./loopback Feb 12 20:51:57.323536 tar[1139]: ./dhcp Feb 12 20:51:57.563518 tar[1139]: ./ptp Feb 12 20:51:57.668958 tar[1139]: ./ipvlan Feb 12 20:51:57.730122 tar[1139]: ./bandwidth Feb 12 20:51:57.803914 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:51:59.629432 locksmithd[1171]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:52:00.029400 sshd_keygen[1134]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:52:00.072668 systemd[1]: Finished sshd-keygen.service. Feb 12 20:52:00.083675 systemd[1]: Starting issuegen.service... Feb 12 20:52:00.094682 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:52:00.094934 systemd[1]: Finished issuegen.service. Feb 12 20:52:00.104607 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:52:00.116369 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:52:00.126396 systemd[1]: Started getty@tty1.service. Feb 12 20:52:00.135464 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:52:00.143567 systemd[1]: Reached target getty.target. Feb 12 20:52:01.354665 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 12 20:52:03.302168 kernel: loop0: detected capacity change from 0 to 2097152 Feb 12 20:52:03.324728 systemd-nspawn[1223]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 12 20:52:03.324728 systemd-nspawn[1223]: Press ^] three times within 1s to kill container. Feb 12 20:52:03.344185 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:52:03.428488 systemd[1]: Started oem-gce.service. Feb 12 20:52:03.436722 systemd[1]: Reached target multi-user.target. Feb 12 20:52:03.448385 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:52:03.460359 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:52:03.460552 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:52:03.470572 systemd[1]: Startup finished in 1.024s (kernel) + 9.075s (initrd) + 15.590s (userspace) = 25.690s. Feb 12 20:52:03.511291 systemd-nspawn[1223]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 12 20:52:03.511291 systemd-nspawn[1223]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 12 20:52:03.511535 systemd-nspawn[1223]: + /usr/bin/google_instance_setup Feb 12 20:52:03.854060 systemd[1]: Created slice system-sshd.slice. Feb 12 20:52:03.856358 systemd[1]: Started sshd@0-10.128.0.39:22-147.75.109.163:54434.service. Feb 12 20:52:04.167020 instance-setup[1229]: INFO Running google_set_multiqueue. Feb 12 20:52:04.175283 sshd[1231]: Accepted publickey for core from 147.75.109.163 port 54434 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:04.179067 sshd[1231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:04.187268 instance-setup[1229]: INFO Set channels for eth0 to 2. Feb 12 20:52:04.192066 instance-setup[1229]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 12 20:52:04.194575 instance-setup[1229]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 12 20:52:04.194718 instance-setup[1229]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 12 20:52:04.196941 instance-setup[1229]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 12 20:52:04.197685 systemd[1]: Created slice user-500.slice. Feb 12 20:52:04.197086 instance-setup[1229]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 12 20:52:04.199279 instance-setup[1229]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 12 20:52:04.199420 instance-setup[1229]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 12 20:52:04.201921 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:52:04.203258 instance-setup[1229]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 12 20:52:04.213672 systemd-logind[1131]: New session 1 of user core. Feb 12 20:52:04.219387 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:52:04.221789 systemd[1]: Starting user@500.service... Feb 12 20:52:04.234750 instance-setup[1229]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 12 20:52:04.234955 instance-setup[1229]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 12 20:52:04.237843 (systemd)[1261]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:04.289050 systemd-nspawn[1223]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 12 20:52:04.395549 systemd[1261]: Queued start job for default target default.target. Feb 12 20:52:04.397314 systemd[1261]: Reached target paths.target. Feb 12 20:52:04.397360 systemd[1261]: Reached target sockets.target. Feb 12 20:52:04.397392 systemd[1261]: Reached target timers.target. Feb 12 20:52:04.397414 systemd[1261]: Reached target basic.target. Feb 12 20:52:04.397569 systemd[1]: Started user@500.service. Feb 12 20:52:04.399072 systemd[1]: Started session-1.scope. Feb 12 20:52:04.402818 systemd[1261]: Reached target default.target. Feb 12 20:52:04.403659 systemd[1261]: Startup finished in 155ms. Feb 12 20:52:04.618677 systemd[1]: Started sshd@1-10.128.0.39:22-147.75.109.163:53962.service. Feb 12 20:52:04.700397 startup-script[1270]: INFO Starting startup scripts. Feb 12 20:52:04.714172 startup-script[1270]: INFO No startup scripts found in metadata. Feb 12 20:52:04.714493 startup-script[1270]: INFO Finished running startup scripts. Feb 12 20:52:04.747485 systemd-nspawn[1223]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 12 20:52:04.748342 systemd-nspawn[1223]: + daemon_pids=() Feb 12 20:52:04.748588 systemd-nspawn[1223]: + for d in accounts clock_skew network Feb 12 20:52:04.748989 systemd-nspawn[1223]: + daemon_pids+=($!) Feb 12 20:52:04.749295 systemd-nspawn[1223]: + for d in accounts clock_skew network Feb 12 20:52:04.749763 systemd-nspawn[1223]: + daemon_pids+=($!) Feb 12 20:52:04.749985 systemd-nspawn[1223]: + for d in accounts clock_skew network Feb 12 20:52:04.750400 systemd-nspawn[1223]: + daemon_pids+=($!) Feb 12 20:52:04.750710 systemd-nspawn[1223]: + NOTIFY_SOCKET=/run/systemd/notify Feb 12 20:52:04.750894 systemd-nspawn[1223]: + /usr/bin/systemd-notify --ready Feb 12 20:52:04.750973 systemd-nspawn[1223]: + /usr/bin/google_network_daemon Feb 12 20:52:04.751551 systemd-nspawn[1223]: + /usr/bin/google_clock_skew_daemon Feb 12 20:52:04.752122 systemd-nspawn[1223]: + /usr/bin/google_accounts_daemon Feb 12 20:52:04.815855 systemd-nspawn[1223]: + wait -n 36 37 38 Feb 12 20:52:04.952530 sshd[1276]: Accepted publickey for core from 147.75.109.163 port 53962 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:04.953950 sshd[1276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:04.961987 systemd[1]: Started session-2.scope. Feb 12 20:52:04.963007 systemd-logind[1131]: New session 2 of user core. Feb 12 20:52:05.169068 sshd[1276]: pam_unix(sshd:session): session closed for user core Feb 12 20:52:05.175553 systemd[1]: sshd@1-10.128.0.39:22-147.75.109.163:53962.service: Deactivated successfully. Feb 12 20:52:05.177010 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:52:05.179485 systemd-logind[1131]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:52:05.180791 systemd-logind[1131]: Removed session 2. Feb 12 20:52:05.214889 systemd[1]: Started sshd@2-10.128.0.39:22-147.75.109.163:53976.service. Feb 12 20:52:05.375172 google-networking[1280]: INFO Starting Google Networking daemon. Feb 12 20:52:05.523919 sshd[1288]: Accepted publickey for core from 147.75.109.163 port 53976 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:05.524564 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:05.532356 systemd-logind[1131]: New session 3 of user core. Feb 12 20:52:05.533320 systemd[1]: Started session-3.scope. Feb 12 20:52:05.549979 google-clock-skew[1279]: INFO Starting Google Clock Skew daemon. Feb 12 20:52:05.560768 google-clock-skew[1279]: INFO Clock drift token has changed: 0. Feb 12 20:52:05.564952 systemd-nspawn[1223]: hwclock: Cannot access the Hardware Clock via any known method. Feb 12 20:52:05.564952 systemd-nspawn[1223]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 12 20:52:05.565797 google-clock-skew[1279]: WARNING Failed to sync system time with hardware clock. Feb 12 20:52:05.568984 groupadd[1295]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 12 20:52:05.574674 groupadd[1295]: group added to /etc/gshadow: name=google-sudoers Feb 12 20:52:05.579394 groupadd[1295]: new group: name=google-sudoers, GID=1000 Feb 12 20:52:05.591972 google-accounts[1278]: INFO Starting Google Accounts daemon. Feb 12 20:52:05.616347 google-accounts[1278]: WARNING OS Login not installed. Feb 12 20:52:05.617488 google-accounts[1278]: INFO Creating a new user account for 0. Feb 12 20:52:05.623738 systemd-nspawn[1223]: useradd: invalid user name '0': use --badname to ignore Feb 12 20:52:05.624471 google-accounts[1278]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 12 20:52:05.727222 sshd[1288]: pam_unix(sshd:session): session closed for user core Feb 12 20:52:05.731348 systemd[1]: sshd@2-10.128.0.39:22-147.75.109.163:53976.service: Deactivated successfully. Feb 12 20:52:05.732404 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:52:05.733269 systemd-logind[1131]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:52:05.734492 systemd-logind[1131]: Removed session 3. Feb 12 20:52:05.772513 systemd[1]: Started sshd@3-10.128.0.39:22-147.75.109.163:53988.service. Feb 12 20:52:06.056758 sshd[1310]: Accepted publickey for core from 147.75.109.163 port 53988 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:06.058650 sshd[1310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:06.065049 systemd[1]: Started session-4.scope. Feb 12 20:52:06.065659 systemd-logind[1131]: New session 4 of user core. Feb 12 20:52:06.268801 sshd[1310]: pam_unix(sshd:session): session closed for user core Feb 12 20:52:06.272957 systemd[1]: sshd@3-10.128.0.39:22-147.75.109.163:53988.service: Deactivated successfully. Feb 12 20:52:06.274003 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:52:06.274871 systemd-logind[1131]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:52:06.276133 systemd-logind[1131]: Removed session 4. Feb 12 20:52:06.313653 systemd[1]: Started sshd@4-10.128.0.39:22-147.75.109.163:54000.service. Feb 12 20:52:06.598028 sshd[1316]: Accepted publickey for core from 147.75.109.163 port 54000 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:06.599935 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:06.606317 systemd[1]: Started session-5.scope. Feb 12 20:52:06.607078 systemd-logind[1131]: New session 5 of user core. Feb 12 20:52:06.790952 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:52:06.791354 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:52:06.800347 dbus-daemon[1109]: \xd0\u000dC\xe7\x9eU: received setenforce notice (enforcing=-1050278256) Feb 12 20:52:06.802423 sudo[1319]: pam_unix(sudo:session): session closed for user root Feb 12 20:52:06.846294 sshd[1316]: pam_unix(sshd:session): session closed for user core Feb 12 20:52:06.850552 systemd[1]: sshd@4-10.128.0.39:22-147.75.109.163:54000.service: Deactivated successfully. Feb 12 20:52:06.851774 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:52:06.852664 systemd-logind[1131]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:52:06.853908 systemd-logind[1131]: Removed session 5. Feb 12 20:52:06.891762 systemd[1]: Started sshd@5-10.128.0.39:22-147.75.109.163:54014.service. Feb 12 20:52:07.178044 sshd[1323]: Accepted publickey for core from 147.75.109.163 port 54014 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:07.180205 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:07.186761 systemd[1]: Started session-6.scope. Feb 12 20:52:07.187544 systemd-logind[1131]: New session 6 of user core. Feb 12 20:52:07.353848 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:52:07.354268 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:52:07.358479 sudo[1327]: pam_unix(sudo:session): session closed for user root Feb 12 20:52:07.369991 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:52:07.370411 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:52:07.382513 systemd[1]: Stopping audit-rules.service... Feb 12 20:52:07.383000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:52:07.384731 auditctl[1330]: No rules Feb 12 20:52:07.390127 kernel: kauditd_printk_skb: 183 callbacks suppressed Feb 12 20:52:07.390250 kernel: audit: type=1305 audit(1707771127.383:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:52:07.385442 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:52:07.385670 systemd[1]: Stopped audit-rules.service. Feb 12 20:52:07.406210 systemd[1]: Starting audit-rules.service... Feb 12 20:52:07.383000 audit[1330]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3c0828d0 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:07.438253 kernel: audit: type=1300 audit(1707771127.383:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff3c0828d0 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:07.438376 kernel: audit: type=1327 audit(1707771127.383:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:52:07.383000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:52:07.441791 augenrules[1347]: No rules Feb 12 20:52:07.443109 systemd[1]: Finished audit-rules.service. Feb 12 20:52:07.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.446530 sudo[1326]: pam_unix(sudo:session): session closed for user root Feb 12 20:52:07.469624 kernel: audit: type=1131 audit(1707771127.383:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.469806 kernel: audit: type=1130 audit(1707771127.443:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.446000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.493685 sshd[1323]: pam_unix(sshd:session): session closed for user core Feb 12 20:52:07.499690 systemd-logind[1131]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:52:07.501956 systemd[1]: sshd@5-10.128.0.39:22-147.75.109.163:54014.service: Deactivated successfully. Feb 12 20:52:07.503020 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:52:07.505022 systemd-logind[1131]: Removed session 6. Feb 12 20:52:07.516109 kernel: audit: type=1106 audit(1707771127.446:170): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.516240 kernel: audit: type=1104 audit(1707771127.446:171): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.446000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.495000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.546703 systemd[1]: Started sshd@6-10.128.0.39:22-147.75.109.163:54022.service. Feb 12 20:52:07.570793 kernel: audit: type=1106 audit(1707771127.495:172): pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.570912 kernel: audit: type=1104 audit(1707771127.495:173): pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.495000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.619103 kernel: audit: type=1131 audit(1707771127.501:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.39:22-147.75.109.163:54014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.39:22-147.75.109.163:54014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.39:22-147.75.109.163:54022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:07.853000 audit[1353]: USER_ACCT pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.856225 sshd[1353]: Accepted publickey for core from 147.75.109.163 port 54022 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:52:07.855000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.855000 audit[1353]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffebbe030 a2=3 a3=0 items=0 ppid=1 pid=1353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:07.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:52:07.857292 sshd[1353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:52:07.864124 systemd[1]: Started session-7.scope. Feb 12 20:52:07.864731 systemd-logind[1131]: New session 7 of user core. Feb 12 20:52:07.872000 audit[1353]: USER_START pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:07.874000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:08.029000 audit[1356]: USER_ACCT pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:08.030331 sudo[1356]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:52:08.029000 audit[1356]: CRED_REFR pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:08.030723 sudo[1356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:52:08.032000 audit[1356]: USER_START pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:08.775422 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:52:08.783615 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:52:08.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:08.784176 systemd[1]: Reached target network-online.target. Feb 12 20:52:08.786222 systemd[1]: Starting docker.service... Feb 12 20:52:08.833040 env[1372]: time="2024-02-12T20:52:08.832990292Z" level=info msg="Starting up" Feb 12 20:52:08.834981 env[1372]: time="2024-02-12T20:52:08.834925761Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:52:08.834981 env[1372]: time="2024-02-12T20:52:08.834951615Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:52:08.835796 env[1372]: time="2024-02-12T20:52:08.834984774Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:52:08.835796 env[1372]: time="2024-02-12T20:52:08.835002313Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:52:08.837390 env[1372]: time="2024-02-12T20:52:08.837343362Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:52:08.837390 env[1372]: time="2024-02-12T20:52:08.837366375Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:52:08.837390 env[1372]: time="2024-02-12T20:52:08.837386484Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:52:08.837585 env[1372]: time="2024-02-12T20:52:08.837399189Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:52:08.844583 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2704697358-merged.mount: Deactivated successfully. Feb 12 20:52:08.880290 env[1372]: time="2024-02-12T20:52:08.880239367Z" level=info msg="Loading containers: start." Feb 12 20:52:08.950000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.950000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdec874880 a2=0 a3=7ffdec87486c items=0 ppid=1372 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 20:52:08.953000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.953000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffea85b2010 a2=0 a3=7ffea85b1ffc items=0 ppid=1372 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.953000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 20:52:08.956000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.956000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe91451c90 a2=0 a3=7ffe91451c7c items=0 ppid=1372 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.956000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:52:08.958000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.958000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe6653cf20 a2=0 a3=7ffe6653cf0c items=0 ppid=1372 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.958000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:52:08.962000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.962000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe21288730 a2=0 a3=7ffe2128871c items=0 ppid=1372 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 20:52:08.981000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.981000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeabb422f0 a2=0 a3=7ffeabb422dc items=0 ppid=1372 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.981000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 20:52:08.992000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.992000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd2d161c10 a2=0 a3=7ffd2d161bfc items=0 ppid=1372 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 20:52:08.995000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.995000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe570a3460 a2=0 a3=7ffe570a344c items=0 ppid=1372 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.995000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 20:52:08.997000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:08.997000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffca1ac4300 a2=0 a3=7ffca1ac42ec items=0 ppid=1372 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:08.997000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:52:09.009000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.009000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcabac0190 a2=0 a3=7ffcabac017c items=0 ppid=1372 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:52:09.010000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.010000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe49f4f180 a2=0 a3=7ffe49f4f16c items=0 ppid=1372 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:52:09.026175 kernel: Initializing XFRM netlink socket Feb 12 20:52:09.071534 env[1372]: time="2024-02-12T20:52:09.071471609Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 20:52:09.099000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.099000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc5acffd20 a2=0 a3=7ffc5acffd0c items=0 ppid=1372 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 20:52:09.113000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.113000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffc7b21ca0 a2=0 a3=7fffc7b21c8c items=0 ppid=1372 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.113000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 20:52:09.119000 audit[1441]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.119000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeaa0542b0 a2=0 a3=7ffeaa05429c items=0 ppid=1372 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.119000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 20:52:09.122000 audit[1443]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.122000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe031cebd0 a2=0 a3=7ffe031cebbc items=0 ppid=1372 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.122000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 20:52:09.125000 audit[1445]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.125000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffcd270c930 a2=0 a3=7ffcd270c91c items=0 ppid=1372 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.125000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 20:52:09.128000 audit[1447]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.128000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd8116e780 a2=0 a3=7ffd8116e76c items=0 ppid=1372 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 20:52:09.131000 audit[1449]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.131000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd86f276d0 a2=0 a3=7ffd86f276bc items=0 ppid=1372 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 20:52:09.143000 audit[1452]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.143000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeff4ef470 a2=0 a3=7ffeff4ef45c items=0 ppid=1372 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.143000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 20:52:09.147000 audit[1454]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.147000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe88a471b0 a2=0 a3=7ffe88a4719c items=0 ppid=1372 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.147000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:52:09.150000 audit[1456]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.150000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd5a30aac0 a2=0 a3=7ffd5a30aaac items=0 ppid=1372 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:52:09.153000 audit[1458]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.153000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff3b9dcea0 a2=0 a3=7fff3b9dce8c items=0 ppid=1372 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 20:52:09.154996 systemd-networkd[1024]: docker0: Link UP Feb 12 20:52:09.168000 audit[1462]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.168000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffba9d4e10 a2=0 a3=7fffba9d4dfc items=0 ppid=1372 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.168000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:52:09.169000 audit[1463]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:09.169000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffede1ccdb0 a2=0 a3=7ffede1ccd9c items=0 ppid=1372 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:09.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:52:09.171421 env[1372]: time="2024-02-12T20:52:09.171370585Z" level=info msg="Loading containers: done." Feb 12 20:52:09.194444 env[1372]: time="2024-02-12T20:52:09.194359665Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 20:52:09.194701 env[1372]: time="2024-02-12T20:52:09.194659054Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 20:52:09.194836 env[1372]: time="2024-02-12T20:52:09.194807606Z" level=info msg="Daemon has completed initialization" Feb 12 20:52:09.216329 systemd[1]: Started docker.service. Feb 12 20:52:09.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:09.227161 env[1372]: time="2024-02-12T20:52:09.227055147Z" level=info msg="API listen on /run/docker.sock" Feb 12 20:52:09.252552 systemd[1]: Reloading. Feb 12 20:52:09.358017 /usr/lib/systemd/system-generators/torcx-generator[1512]: time="2024-02-12T20:52:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:52:09.364574 /usr/lib/systemd/system-generators/torcx-generator[1512]: time="2024-02-12T20:52:09Z" level=info msg="torcx already run" Feb 12 20:52:09.462533 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:52:09.462560 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:52:09.485649 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit: BPF prog-id=37 op=LOAD Feb 12 20:52:09.574000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit: BPF prog-id=38 op=LOAD Feb 12 20:52:09.575000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit: BPF prog-id=39 op=LOAD Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.575000 audit: BPF prog-id=40 op=LOAD Feb 12 20:52:09.575000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:52:09.575000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.580000 audit: BPF prog-id=41 op=LOAD Feb 12 20:52:09.580000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit: BPF prog-id=42 op=LOAD Feb 12 20:52:09.582000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit: BPF prog-id=43 op=LOAD Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.582000 audit: BPF prog-id=44 op=LOAD Feb 12 20:52:09.582000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:52:09.582000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit: BPF prog-id=45 op=LOAD Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.603000 audit: BPF prog-id=46 op=LOAD Feb 12 20:52:09.603000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:52:09.603000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit: BPF prog-id=47 op=LOAD Feb 12 20:52:09.605000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit: BPF prog-id=48 op=LOAD Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.605000 audit: BPF prog-id=49 op=LOAD Feb 12 20:52:09.605000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:52:09.605000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.608000 audit: BPF prog-id=50 op=LOAD Feb 12 20:52:09.608000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.610000 audit: BPF prog-id=51 op=LOAD Feb 12 20:52:09.610000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit: BPF prog-id=52 op=LOAD Feb 12 20:52:09.611000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit: BPF prog-id=53 op=LOAD Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:09.613000 audit: BPF prog-id=54 op=LOAD Feb 12 20:52:09.613000 audit: BPF prog-id=33 op=UNLOAD Feb 12 20:52:09.613000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:52:09.628173 systemd[1]: Started kubelet.service. Feb 12 20:52:09.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:09.735586 kubelet[1554]: E0212 20:52:09.735362 1554 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 20:52:09.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:52:09.737872 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:52:09.738048 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:52:10.237125 env[1145]: time="2024-02-12T20:52:10.237051263Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 20:52:10.703776 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1887769027.mount: Deactivated successfully. Feb 12 20:52:13.729958 env[1145]: time="2024-02-12T20:52:13.729886087Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:13.733232 env[1145]: time="2024-02-12T20:52:13.733184469Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:13.736758 env[1145]: time="2024-02-12T20:52:13.736697563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:13.739291 env[1145]: time="2024-02-12T20:52:13.739258089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:13.740697 env[1145]: time="2024-02-12T20:52:13.740653594Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:84900298406b2df97ade16b73c49c2b73265ded8735ac19a4e20c2a4ad65853f\"" Feb 12 20:52:13.755217 env[1145]: time="2024-02-12T20:52:13.755167384Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 20:52:15.756940 env[1145]: time="2024-02-12T20:52:15.756865850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:15.760110 env[1145]: time="2024-02-12T20:52:15.760058154Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:15.769119 env[1145]: time="2024-02-12T20:52:15.769073447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:15.771691 env[1145]: time="2024-02-12T20:52:15.771641300Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:15.772787 env[1145]: time="2024-02-12T20:52:15.772734428Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:921f237b560bdb02300f82d3606635d395b20635512fab10f0191cff42079486\"" Feb 12 20:52:15.787566 env[1145]: time="2024-02-12T20:52:15.787520958Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 20:52:16.928951 env[1145]: time="2024-02-12T20:52:16.928879728Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:16.931837 env[1145]: time="2024-02-12T20:52:16.931786226Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:16.934466 env[1145]: time="2024-02-12T20:52:16.934427852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:16.936841 env[1145]: time="2024-02-12T20:52:16.936804857Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:16.937801 env[1145]: time="2024-02-12T20:52:16.937747255Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:4fe82b56f06250b6b7eb3d5a879cd2cfabf41cb3e45b24af6059eadbc3b8026e\"" Feb 12 20:52:16.952230 env[1145]: time="2024-02-12T20:52:16.952181641Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 20:52:18.022325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2468458481.mount: Deactivated successfully. Feb 12 20:52:18.590567 env[1145]: time="2024-02-12T20:52:18.590491473Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.593424 env[1145]: time="2024-02-12T20:52:18.593374707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.595729 env[1145]: time="2024-02-12T20:52:18.595684599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.597790 env[1145]: time="2024-02-12T20:52:18.597750386Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.598461 env[1145]: time="2024-02-12T20:52:18.598413000Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 20:52:18.612621 env[1145]: time="2024-02-12T20:52:18.612573163Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 20:52:18.977990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1166436510.mount: Deactivated successfully. Feb 12 20:52:18.987556 env[1145]: time="2024-02-12T20:52:18.987482974Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.990269 env[1145]: time="2024-02-12T20:52:18.990222344Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.992471 env[1145]: time="2024-02-12T20:52:18.992425488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.994735 env[1145]: time="2024-02-12T20:52:18.994674675Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:18.995607 env[1145]: time="2024-02-12T20:52:18.995543971Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 20:52:19.010561 env[1145]: time="2024-02-12T20:52:19.010517015Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 20:52:19.734072 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3735308631.mount: Deactivated successfully. Feb 12 20:52:19.832753 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 20:52:19.833059 systemd[1]: Stopped kubelet.service. Feb 12 20:52:19.863083 kernel: kauditd_printk_skb: 293 callbacks suppressed Feb 12 20:52:19.863241 kernel: audit: type=1130 audit(1707771139.831:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:19.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:19.862539 systemd[1]: Started kubelet.service. Feb 12 20:52:19.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:19.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:19.915977 kernel: audit: type=1131 audit(1707771139.831:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:19.916115 kernel: audit: type=1130 audit(1707771139.861:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:19.997795 kubelet[1599]: E0212 20:52:19.996900 1599 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 20:52:20.003523 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:52:20.003737 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:52:20.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:52:20.026179 kernel: audit: type=1131 audit(1707771140.003:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:52:24.473932 env[1145]: time="2024-02-12T20:52:24.473850239Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:24.476709 env[1145]: time="2024-02-12T20:52:24.476658022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:24.479100 env[1145]: time="2024-02-12T20:52:24.479060619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:24.481510 env[1145]: time="2024-02-12T20:52:24.481463015Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:24.482450 env[1145]: time="2024-02-12T20:52:24.482408441Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:fce326961ae2d51a5f726883fd59d2a8c2ccc3e45d3bb859882db58e422e59e7\"" Feb 12 20:52:24.496545 env[1145]: time="2024-02-12T20:52:24.496497917Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 20:52:24.977512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2860309012.mount: Deactivated successfully. Feb 12 20:52:25.669532 env[1145]: time="2024-02-12T20:52:25.669454264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:25.672267 env[1145]: time="2024-02-12T20:52:25.672216576Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:25.674459 env[1145]: time="2024-02-12T20:52:25.674415246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:25.676464 env[1145]: time="2024-02-12T20:52:25.676421754Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:25.677278 env[1145]: time="2024-02-12T20:52:25.677199654Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:5185b96f0becf59032b8e3646e99f84d9655dff3ac9e2605e0dc77f9c441ae4a\"" Feb 12 20:52:26.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:26.067911 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 12 20:52:26.091212 kernel: audit: type=1131 audit(1707771146.067:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:26.108000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:52:26.123707 kernel: audit: type=1334 audit(1707771146.108:423): prog-id=54 op=UNLOAD Feb 12 20:52:26.123840 kernel: audit: type=1334 audit(1707771146.108:424): prog-id=53 op=UNLOAD Feb 12 20:52:26.108000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:52:26.108000 audit: BPF prog-id=52 op=UNLOAD Feb 12 20:52:26.131203 kernel: audit: type=1334 audit(1707771146.108:425): prog-id=52 op=UNLOAD Feb 12 20:52:29.325891 systemd[1]: Stopped kubelet.service. Feb 12 20:52:29.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:29.348333 kernel: audit: type=1130 audit(1707771149.326:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:29.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:29.370201 kernel: audit: type=1131 audit(1707771149.348:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:29.375692 systemd[1]: Reloading. Feb 12 20:52:29.480872 /usr/lib/systemd/system-generators/torcx-generator[1690]: time="2024-02-12T20:52:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:52:29.480934 /usr/lib/systemd/system-generators/torcx-generator[1690]: time="2024-02-12T20:52:29Z" level=info msg="torcx already run" Feb 12 20:52:29.581067 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:52:29.581094 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:52:29.606444 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:52:29.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.726029 kernel: audit: type=1400 audit(1707771149.703:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.747516 kernel: audit: type=1400 audit(1707771149.703:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.769801 kernel: audit: type=1400 audit(1707771149.708:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.769907 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.723000 audit: BPF prog-id=55 op=LOAD Feb 12 20:52:29.723000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit: BPF prog-id=56 op=LOAD Feb 12 20:52:29.724000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit: BPF prog-id=57 op=LOAD Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.724000 audit: BPF prog-id=58 op=LOAD Feb 12 20:52:29.724000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:52:29.724000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.745000 audit: BPF prog-id=59 op=LOAD Feb 12 20:52:29.745000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.767000 audit: BPF prog-id=60 op=LOAD Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit: BPF prog-id=61 op=LOAD Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.774000 audit: BPF prog-id=62 op=LOAD Feb 12 20:52:29.774000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:52:29.774000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:52:29.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit: BPF prog-id=63 op=LOAD Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.777000 audit: BPF prog-id=64 op=LOAD Feb 12 20:52:29.777000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:52:29.777000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:52:29.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:29.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:29.808288 systemd[1]: Started kubelet.service. Feb 12 20:52:29.889458 kubelet[1734]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:52:29.889458 kubelet[1734]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:52:29.890003 kubelet[1734]: I0212 20:52:29.889534 1734 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:52:29.891246 kubelet[1734]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:52:29.891246 kubelet[1734]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:52:30.323904 kubelet[1734]: I0212 20:52:30.323416 1734 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:52:30.323904 kubelet[1734]: I0212 20:52:30.323456 1734 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:52:30.323904 kubelet[1734]: I0212 20:52:30.323790 1734 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:52:30.328245 kubelet[1734]: E0212 20:52:30.328217 1734 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.39:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.328483 kubelet[1734]: I0212 20:52:30.328461 1734 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:52:30.333303 kubelet[1734]: I0212 20:52:30.333277 1734 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:52:30.333749 kubelet[1734]: I0212 20:52:30.333731 1734 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:52:30.333964 kubelet[1734]: I0212 20:52:30.333939 1734 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:52:30.334265 kubelet[1734]: I0212 20:52:30.334248 1734 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:52:30.334388 kubelet[1734]: I0212 20:52:30.334375 1734 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:52:30.334603 kubelet[1734]: I0212 20:52:30.334583 1734 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:52:30.338410 kubelet[1734]: I0212 20:52:30.338368 1734 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:52:30.338410 kubelet[1734]: I0212 20:52:30.338399 1734 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:52:30.338574 kubelet[1734]: I0212 20:52:30.338434 1734 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:52:30.338574 kubelet[1734]: I0212 20:52:30.338456 1734 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:52:30.343792 kubelet[1734]: I0212 20:52:30.343772 1734 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:52:30.344197 kubelet[1734]: W0212 20:52:30.344125 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.344312 kubelet[1734]: E0212 20:52:30.344221 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.344374 kubelet[1734]: W0212 20:52:30.344330 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.344432 kubelet[1734]: E0212 20:52:30.344382 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.347520 kubelet[1734]: W0212 20:52:30.347484 1734 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:52:30.348166 kubelet[1734]: I0212 20:52:30.348122 1734 server.go:1186] "Started kubelet" Feb 12 20:52:30.348634 kubelet[1734]: E0212 20:52:30.348516 1734 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d02628813d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 348091709, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 348091709, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.39:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.39:6443: connect: connection refused'(may retry after sleeping) Feb 12 20:52:30.349736 kubelet[1734]: I0212 20:52:30.349717 1734 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:52:30.349000 audit[1734]: AVC avc: denied { mac_admin } for pid=1734 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:30.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:52:30.349000 audit[1734]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e10000 a1=c000529308 a2=c000945fb0 a3=25 items=0 ppid=1 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.349000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:52:30.349000 audit[1734]: AVC avc: denied { mac_admin } for pid=1734 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:30.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:52:30.349000 audit[1734]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000257480 a1=c000529320 a2=c000e10090 a3=25 items=0 ppid=1 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.349000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:52:30.351461 kubelet[1734]: I0212 20:52:30.350666 1734 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:52:30.351461 kubelet[1734]: I0212 20:52:30.350727 1734 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:52:30.351461 kubelet[1734]: I0212 20:52:30.350815 1734 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:52:30.351834 kubelet[1734]: I0212 20:52:30.351810 1734 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:52:30.353108 kubelet[1734]: E0212 20:52:30.353085 1734 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:52:30.353310 kubelet[1734]: E0212 20:52:30.353292 1734 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:52:30.354000 audit[1744]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.354000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc56f14920 a2=0 a3=7ffc56f1490c items=0 ppid=1734 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:52:30.356186 kubelet[1734]: I0212 20:52:30.356042 1734 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:52:30.357251 kubelet[1734]: E0212 20:52:30.357210 1734 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.128.0.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.357760 kubelet[1734]: I0212 20:52:30.357741 1734 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:52:30.358439 kubelet[1734]: W0212 20:52:30.358388 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.358594 kubelet[1734]: E0212 20:52:30.358578 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.358000 audit[1745]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.358000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffbbf99430 a2=0 a3=7fffbbf9941c items=0 ppid=1734 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:52:30.363000 audit[1747]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.363000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc2b496a0 a2=0 a3=7ffcc2b4968c items=0 ppid=1734 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:52:30.369000 audit[1749]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.369000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdff0bc070 a2=0 a3=7ffdff0bc05c items=0 ppid=1734 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:52:30.396000 audit[1755]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1755 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.396000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe537b5720 a2=0 a3=7ffe537b570c items=0 ppid=1734 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:52:30.400000 audit[1757]: NETFILTER_CFG table=nat:31 family=2 entries=1 op=nft_register_chain pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.400000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3797d360 a2=0 a3=7ffd3797d34c items=0 ppid=1734 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:52:30.411000 audit[1760]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.411000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffffc7f2e80 a2=0 a3=7ffffc7f2e6c items=0 ppid=1734 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:52:30.413689 kubelet[1734]: I0212 20:52:30.413663 1734 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:52:30.413877 kubelet[1734]: I0212 20:52:30.413860 1734 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:52:30.413981 kubelet[1734]: I0212 20:52:30.413968 1734 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:52:30.417000 audit[1763]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.417000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffdba8830c0 a2=0 a3=7ffdba8830ac items=0 ppid=1734 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:52:30.419000 audit[1764]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.419000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffede35f350 a2=0 a3=7ffede35f33c items=0 ppid=1734 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:52:30.421000 audit[1765]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.421000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0bf80cf0 a2=0 a3=7fff0bf80cdc items=0 ppid=1734 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:52:30.424000 audit[1767]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_rule pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.424000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffda6620930 a2=0 a3=7ffda662091c items=0 ppid=1734 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:52:30.428000 audit[1769]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.428000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd67301300 a2=0 a3=7ffd673012ec items=0 ppid=1734 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:52:30.431000 audit[1771]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.431000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffc1cfcdfe0 a2=0 a3=7ffc1cfcdfcc items=0 ppid=1734 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:52:30.436000 audit[1773]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.436000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc4b691c40 a2=0 a3=7ffc4b691c2c items=0 ppid=1734 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:52:30.439000 audit[1775]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.439000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff918766e0 a2=0 a3=7fff918766cc items=0 ppid=1734 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:52:30.441514 kubelet[1734]: I0212 20:52:30.441460 1734 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:52:30.441000 audit[1776]: NETFILTER_CFG table=mangle:41 family=10 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.441000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe5abfa4f0 a2=0 a3=7ffe5abfa4dc items=0 ppid=1734 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:52:30.442000 audit[1777]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.442000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcab03b860 a2=0 a3=10e3 items=0 ppid=1734 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:52:30.443000 audit[1778]: NETFILTER_CFG table=nat:43 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.443000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe98b8eda0 a2=0 a3=7ffe98b8ed8c items=0 ppid=1734 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:52:30.444000 audit[1779]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=1779 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.444000 audit[1779]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff42205f00 a2=0 a3=7fff42205eec items=0 ppid=1734 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:52:30.446000 audit[1781]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:30.446000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3a690890 a2=0 a3=7fff3a69087c items=0 ppid=1734 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:52:30.447000 audit[1782]: NETFILTER_CFG table=nat:46 family=10 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.447000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffff4d5d3d0 a2=0 a3=7ffff4d5d3bc items=0 ppid=1734 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:52:30.448000 audit[1783]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=1783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.448000 audit[1783]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fffdd293160 a2=0 a3=7fffdd29314c items=0 ppid=1734 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:52:30.452000 audit[1785]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.452000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe5dc84ee0 a2=0 a3=7ffe5dc84ecc items=0 ppid=1734 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:52:30.453000 audit[1786]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.453000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf4603590 a2=0 a3=7ffdf460357c items=0 ppid=1734 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.453000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:52:30.455000 audit[1787]: NETFILTER_CFG table=nat:50 family=10 entries=1 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.455000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda1a197c0 a2=0 a3=7ffda1a197ac items=0 ppid=1734 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:52:30.458000 audit[1789]: NETFILTER_CFG table=nat:51 family=10 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.458000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd74c36b30 a2=0 a3=7ffd74c36b1c items=0 ppid=1734 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:52:30.461595 kubelet[1734]: I0212 20:52:30.461566 1734 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.462061 kubelet[1734]: E0212 20:52:30.462025 1734 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.39:6443/api/v1/nodes\": dial tcp 10.128.0.39:6443: connect: connection refused" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.462000 audit[1791]: NETFILTER_CFG table=nat:52 family=10 entries=2 op=nft_register_chain pid=1791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.462000 audit[1791]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe5a8d05b0 a2=0 a3=7ffe5a8d059c items=0 ppid=1734 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.462000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:52:30.466000 audit[1793]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.466000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fffd7a413c0 a2=0 a3=7fffd7a413ac items=0 ppid=1734 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:52:30.469000 audit[1795]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.469000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffdca842150 a2=0 a3=7ffdca84213c items=0 ppid=1734 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.469000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:52:30.474000 audit[1797]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_rule pid=1797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.474000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffcb71cdcb0 a2=0 a3=7ffcb71cdc9c items=0 ppid=1734 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:52:30.476256 kubelet[1734]: I0212 20:52:30.476230 1734 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:52:30.476370 kubelet[1734]: I0212 20:52:30.476264 1734 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:52:30.476370 kubelet[1734]: I0212 20:52:30.476290 1734 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:52:30.476370 kubelet[1734]: E0212 20:52:30.476364 1734 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:52:30.476000 audit[1798]: NETFILTER_CFG table=mangle:56 family=10 entries=1 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.476000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0cefe6f0 a2=0 a3=7ffe0cefe6dc items=0 ppid=1734 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.478496 kubelet[1734]: W0212 20:52:30.478276 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.478496 kubelet[1734]: E0212 20:52:30.478341 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.476000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:52:30.478000 audit[1799]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.478000 audit[1799]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff189a82c0 a2=0 a3=7fff189a82ac items=0 ppid=1734 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:52:30.480000 audit[1800]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:30.480000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec6fecc80 a2=0 a3=7ffec6fecc6c items=0 ppid=1734 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:52:30.558896 kubelet[1734]: E0212 20:52:30.558840 1734 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.128.0.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:30.573115 kubelet[1734]: I0212 20:52:30.573068 1734 policy_none.go:49] "None policy: Start" Feb 12 20:52:30.575531 kubelet[1734]: I0212 20:52:30.574616 1734 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:52:30.575531 kubelet[1734]: I0212 20:52:30.574664 1734 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:52:30.577129 kubelet[1734]: E0212 20:52:30.577102 1734 kubelet.go:2137] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 20:52:30.652869 systemd[1]: Created slice kubepods.slice. Feb 12 20:52:30.660403 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:52:30.668359 kubelet[1734]: I0212 20:52:30.668331 1734 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.670845 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:52:30.671368 kubelet[1734]: E0212 20:52:30.671230 1734 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.39:6443/api/v1/nodes\": dial tcp 10.128.0.39:6443: connect: connection refused" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.672901 kubelet[1734]: I0212 20:52:30.672878 1734 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:52:30.671000 audit[1734]: AVC avc: denied { mac_admin } for pid=1734 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:30.671000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:52:30.671000 audit[1734]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eba570 a1=c000b61ce0 a2=c000eba540 a3=25 items=0 ppid=1 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:30.671000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:52:30.674250 kubelet[1734]: I0212 20:52:30.674034 1734 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:52:30.674650 kubelet[1734]: I0212 20:52:30.674628 1734 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:52:30.675847 kubelet[1734]: E0212 20:52:30.675822 1734 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" not found" Feb 12 20:52:30.777555 kubelet[1734]: I0212 20:52:30.777497 1734 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:30.782525 kubelet[1734]: I0212 20:52:30.782492 1734 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:30.787118 kubelet[1734]: I0212 20:52:30.787087 1734 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:30.788612 kubelet[1734]: I0212 20:52:30.788560 1734 status_manager.go:698] "Failed to get status for pod" podUID=52fbcfff4c82b2322117e83f1a0ff224 pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" err="Get \"https://10.128.0.39:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\": dial tcp 10.128.0.39:6443: connect: connection refused" Feb 12 20:52:30.794980 systemd[1]: Created slice kubepods-burstable-pod52fbcfff4c82b2322117e83f1a0ff224.slice. Feb 12 20:52:30.796098 kubelet[1734]: I0212 20:52:30.795960 1734 status_manager.go:698] "Failed to get status for pod" podUID=e2b9bc220c354189f331c5df36defa3d pod="kube-system/kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" err="Get \"https://10.128.0.39:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\": dial tcp 10.128.0.39:6443: connect: connection refused" Feb 12 20:52:30.798907 kubelet[1734]: I0212 20:52:30.798870 1734 status_manager.go:698] "Failed to get status for pod" podUID=e5d4ae9a3ffc0885b350c7bee057750e pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" err="Get \"https://10.128.0.39:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\": dial tcp 10.128.0.39:6443: connect: connection refused" Feb 12 20:52:30.810338 systemd[1]: Created slice kubepods-burstable-pode2b9bc220c354189f331c5df36defa3d.slice. Feb 12 20:52:30.817089 systemd[1]: Created slice kubepods-burstable-pode5d4ae9a3ffc0885b350c7bee057750e.slice. Feb 12 20:52:30.863400 kubelet[1734]: I0212 20:52:30.863355 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.863695 kubelet[1734]: I0212 20:52:30.863658 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e2b9bc220c354189f331c5df36defa3d-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e2b9bc220c354189f331c5df36defa3d\") " pod="kube-system/kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.863789 kubelet[1734]: I0212 20:52:30.863710 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e5d4ae9a3ffc0885b350c7bee057750e-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e5d4ae9a3ffc0885b350c7bee057750e\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.863789 kubelet[1734]: I0212 20:52:30.863752 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e5d4ae9a3ffc0885b350c7bee057750e-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e5d4ae9a3ffc0885b350c7bee057750e\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.864009 kubelet[1734]: I0212 20:52:30.863796 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e5d4ae9a3ffc0885b350c7bee057750e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e5d4ae9a3ffc0885b350c7bee057750e\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.864009 kubelet[1734]: I0212 20:52:30.863839 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.864009 kubelet[1734]: I0212 20:52:30.863894 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.864009 kubelet[1734]: I0212 20:52:30.863935 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.864244 kubelet[1734]: I0212 20:52:30.863976 1734 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:30.960136 kubelet[1734]: E0212 20:52:30.960078 1734 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.128.0.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.077654 kubelet[1734]: I0212 20:52:31.077613 1734 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:31.078136 kubelet[1734]: E0212 20:52:31.078077 1734 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.39:6443/api/v1/nodes\": dial tcp 10.128.0.39:6443: connect: connection refused" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:31.108215 env[1145]: time="2024-02-12T20:52:31.108138305Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal,Uid:52fbcfff4c82b2322117e83f1a0ff224,Namespace:kube-system,Attempt:0,}" Feb 12 20:52:31.115837 env[1145]: time="2024-02-12T20:52:31.114825174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal,Uid:e2b9bc220c354189f331c5df36defa3d,Namespace:kube-system,Attempt:0,}" Feb 12 20:52:31.120924 env[1145]: time="2024-02-12T20:52:31.120822270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal,Uid:e5d4ae9a3ffc0885b350c7bee057750e,Namespace:kube-system,Attempt:0,}" Feb 12 20:52:31.460786 kubelet[1734]: W0212 20:52:31.460613 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.460786 kubelet[1734]: E0212 20:52:31.460691 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.39:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.760854 kubelet[1734]: E0212 20:52:31.760708 1734 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.128.0.39:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal?timeout=10s": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.807638 kubelet[1734]: W0212 20:52:31.807551 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.807638 kubelet[1734]: E0212 20:52:31.807634 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.39:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.827053 kubelet[1734]: W0212 20:52:31.827000 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.827053 kubelet[1734]: E0212 20:52:31.827057 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.39:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.884208 kubelet[1734]: I0212 20:52:31.884089 1734 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:31.884587 kubelet[1734]: E0212 20:52:31.884543 1734 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.39:6443/api/v1/nodes\": dial tcp 10.128.0.39:6443: connect: connection refused" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:31.955206 kubelet[1734]: W0212 20:52:31.955121 1734 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:31.955206 kubelet[1734]: E0212 20:52:31.955213 1734 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.39:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:32.218209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1976125873.mount: Deactivated successfully. Feb 12 20:52:32.233356 env[1145]: time="2024-02-12T20:52:32.233264002Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.236175 env[1145]: time="2024-02-12T20:52:32.236098351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.238352 env[1145]: time="2024-02-12T20:52:32.238294944Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.239606 env[1145]: time="2024-02-12T20:52:32.239553474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.244318 env[1145]: time="2024-02-12T20:52:32.244265312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.245493 env[1145]: time="2024-02-12T20:52:32.245439721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.246459 env[1145]: time="2024-02-12T20:52:32.246423763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.248711 env[1145]: time="2024-02-12T20:52:32.248675393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.249720 env[1145]: time="2024-02-12T20:52:32.249665983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.250671 env[1145]: time="2024-02-12T20:52:32.250634171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.254616 env[1145]: time="2024-02-12T20:52:32.254562101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.256091 env[1145]: time="2024-02-12T20:52:32.256038323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:32.289192 env[1145]: time="2024-02-12T20:52:32.289073909Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:32.289959 env[1145]: time="2024-02-12T20:52:32.289130213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:32.289959 env[1145]: time="2024-02-12T20:52:32.289175286Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:32.289959 env[1145]: time="2024-02-12T20:52:32.289350105Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1acce93bc3b1abc5db8c7a55f9b251ebaf88c6d72273b8512d93c221f951c6f2 pid=1809 runtime=io.containerd.runc.v2 Feb 12 20:52:32.332935 systemd[1]: Started cri-containerd-1acce93bc3b1abc5db8c7a55f9b251ebaf88c6d72273b8512d93c221f951c6f2.scope. Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.355435325Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.355481523Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.355498808Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.355663174Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d060c6dd8047fcd54266845ac4d2d9e359d3afb6f9348a2286c192cc31ffe3f6 pid=1849 runtime=io.containerd.runc.v2 Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.353483189Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.353538945Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:32.355791 env[1145]: time="2024-02-12T20:52:32.353558574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:32.384518 kernel: kauditd_printk_skb: 378 callbacks suppressed Feb 12 20:52:32.384688 kernel: audit: type=1400 audit(1707771152.357:588): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.385214 env[1145]: time="2024-02-12T20:52:32.385087996Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a138f03a366d6dbf80c1dee14bf27ed9d42d325bae5841f1781c83aa425a4365 pid=1842 runtime=io.containerd.runc.v2 Feb 12 20:52:32.405236 kernel: audit: type=1400 audit(1707771152.357:589): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406949 kubelet[1734]: E0212 20:52:32.406919 1734 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.39:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.39:6443: connect: connection refused Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.444333 systemd[1]: Started cri-containerd-a138f03a366d6dbf80c1dee14bf27ed9d42d325bae5841f1781c83aa425a4365.scope. Feb 12 20:52:32.448753 kernel: audit: type=1400 audit(1707771152.357:590): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.451356 kernel: audit: type=1400 audit(1707771152.357:591): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.464003 systemd[1]: Started cri-containerd-d060c6dd8047fcd54266845ac4d2d9e359d3afb6f9348a2286c192cc31ffe3f6.scope. Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.508221 kernel: audit: type=1400 audit(1707771152.357:592): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.508393 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:52:32.508439 kernel: audit: audit_lost=50 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 20:52:32.508482 kernel: audit: backlog limit exceeded Feb 12 20:52:32.508519 kernel: audit: type=1400 audit(1707771152.357:593): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.537285 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit: BPF prog-id=70 op=LOAD Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1809 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636365393362633362316162633564623863376135356639623235 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1809 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636365393362633362316162633564623863376135356639623235 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.406000 audit: BPF prog-id=71 op=LOAD Feb 12 20:52:32.406000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bc810 items=0 ppid=1809 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636365393362633362316162633564623863376135356639623235 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.459000 audit: BPF prog-id=72 op=LOAD Feb 12 20:52:32.459000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000288e68 items=0 ppid=1809 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636365393362633362316162633564623863376135356639623235 Feb 12 20:52:32.459000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:52:32.459000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.460000 audit: BPF prog-id=73 op=LOAD Feb 12 20:52:32.460000 audit[1820]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000289278 items=0 ppid=1809 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161636365393362633362316162633564623863376135356639623235 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.528000 audit: BPF prog-id=74 op=LOAD Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit: BPF prog-id=78 op=LOAD Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1849 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430363063366464383034376663643534323636383435616334643264 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1849 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430363063366464383034376663643534323636383435616334643264 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.555000 audit: BPF prog-id=79 op=LOAD Feb 12 20:52:32.555000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cf0 items=0 ppid=1849 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430363063366464383034376663643534323636383435616334643264 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit: BPF prog-id=80 op=LOAD Feb 12 20:52:32.556000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d38 items=0 ppid=1849 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430363063366464383034376663643534323636383435616334643264 Feb 12 20:52:32.556000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:52:32.556000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { perfmon } for pid=1872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit[1872]: AVC avc: denied { bpf } for pid=1872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.556000 audit: BPF prog-id=81 op=LOAD Feb 12 20:52:32.556000 audit[1872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d6148 items=0 ppid=1849 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430363063366464383034376663643534323636383435616334643264 Feb 12 20:52:32.599602 env[1145]: time="2024-02-12T20:52:32.599545179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal,Uid:e2b9bc220c354189f331c5df36defa3d,Namespace:kube-system,Attempt:0,} returns sandbox id \"a138f03a366d6dbf80c1dee14bf27ed9d42d325bae5841f1781c83aa425a4365\"" Feb 12 20:52:32.607133 kubelet[1734]: E0212 20:52:32.606760 1734 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-21291" Feb 12 20:52:32.610006 env[1145]: time="2024-02-12T20:52:32.609940939Z" level=info msg="CreateContainer within sandbox \"a138f03a366d6dbf80c1dee14bf27ed9d42d325bae5841f1781c83aa425a4365\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 20:52:32.613161 env[1145]: time="2024-02-12T20:52:32.613055331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal,Uid:52fbcfff4c82b2322117e83f1a0ff224,Namespace:kube-system,Attempt:0,} returns sandbox id \"1acce93bc3b1abc5db8c7a55f9b251ebaf88c6d72273b8512d93c221f951c6f2\"" Feb 12 20:52:32.616183 kubelet[1734]: E0212 20:52:32.615028 1734 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flat" Feb 12 20:52:32.616869 env[1145]: time="2024-02-12T20:52:32.616825366Z" level=info msg="CreateContainer within sandbox \"1acce93bc3b1abc5db8c7a55f9b251ebaf88c6d72273b8512d93c221f951c6f2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 20:52:32.640618 env[1145]: time="2024-02-12T20:52:32.640555797Z" level=info msg="CreateContainer within sandbox \"a138f03a366d6dbf80c1dee14bf27ed9d42d325bae5841f1781c83aa425a4365\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"399219f328ccfbf493e0614f6eaee1d802fc0f58949653818007915020f4c48e\"" Feb 12 20:52:32.640979 env[1145]: time="2024-02-12T20:52:32.640628580Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal,Uid:e5d4ae9a3ffc0885b350c7bee057750e,Namespace:kube-system,Attempt:0,} returns sandbox id \"d060c6dd8047fcd54266845ac4d2d9e359d3afb6f9348a2286c192cc31ffe3f6\"" Feb 12 20:52:32.641863 env[1145]: time="2024-02-12T20:52:32.641809322Z" level=info msg="StartContainer for \"399219f328ccfbf493e0614f6eaee1d802fc0f58949653818007915020f4c48e\"" Feb 12 20:52:32.644979 kubelet[1734]: E0212 20:52:32.644950 1734 kubelet_pods.go:413] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-21291" Feb 12 20:52:32.646832 env[1145]: time="2024-02-12T20:52:32.646791841Z" level=info msg="CreateContainer within sandbox \"d060c6dd8047fcd54266845ac4d2d9e359d3afb6f9348a2286c192cc31ffe3f6\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 20:52:32.661089 env[1145]: time="2024-02-12T20:52:32.661024986Z" level=info msg="CreateContainer within sandbox \"1acce93bc3b1abc5db8c7a55f9b251ebaf88c6d72273b8512d93c221f951c6f2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ab131b1ddccacfea1a07e0522ad50c6e9a315296c43673932ae7623a67491d00\"" Feb 12 20:52:32.661998 env[1145]: time="2024-02-12T20:52:32.661951311Z" level=info msg="StartContainer for \"ab131b1ddccacfea1a07e0522ad50c6e9a315296c43673932ae7623a67491d00\"" Feb 12 20:52:32.667699 env[1145]: time="2024-02-12T20:52:32.667652592Z" level=info msg="CreateContainer within sandbox \"d060c6dd8047fcd54266845ac4d2d9e359d3afb6f9348a2286c192cc31ffe3f6\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"f8fd3bfa6fdd6a17e258f98b2c5b6cd6a12bd85079e4a8e7a883846f92d840c9\"" Feb 12 20:52:32.668472 env[1145]: time="2024-02-12T20:52:32.668437056Z" level=info msg="StartContainer for \"f8fd3bfa6fdd6a17e258f98b2c5b6cd6a12bd85079e4a8e7a883846f92d840c9\"" Feb 12 20:52:32.671681 systemd[1]: Started cri-containerd-399219f328ccfbf493e0614f6eaee1d802fc0f58949653818007915020f4c48e.scope. Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.705000 audit: BPF prog-id=82 op=LOAD Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1842 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339393231396633323863636662663439336530363134663665616565 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1842 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339393231396633323863636662663439336530363134663665616565 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit: BPF prog-id=83 op=LOAD Feb 12 20:52:32.706000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00030a840 items=0 ppid=1842 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339393231396633323863636662663439336530363134663665616565 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit: BPF prog-id=84 op=LOAD Feb 12 20:52:32.706000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00030a888 items=0 ppid=1842 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339393231396633323863636662663439336530363134663665616565 Feb 12 20:52:32.706000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:52:32.706000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.706000 audit: BPF prog-id=85 op=LOAD Feb 12 20:52:32.706000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00030ac98 items=0 ppid=1842 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339393231396633323863636662663439336530363134663665616565 Feb 12 20:52:32.719014 systemd[1]: Started cri-containerd-ab131b1ddccacfea1a07e0522ad50c6e9a315296c43673932ae7623a67491d00.scope. Feb 12 20:52:32.728290 systemd[1]: Started cri-containerd-f8fd3bfa6fdd6a17e258f98b2c5b6cd6a12bd85079e4a8e7a883846f92d840c9.scope. Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.745000 audit: BPF prog-id=86 op=LOAD Feb 12 20:52:32.747000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.747000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1809 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313331623164646363616366656131613037653035323261643530 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1809 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313331623164646363616366656131613037653035323261643530 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.749000 audit: BPF prog-id=87 op=LOAD Feb 12 20:52:32.749000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00040c260 items=0 ppid=1809 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313331623164646363616366656131613037653035323261643530 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.751000 audit: BPF prog-id=88 op=LOAD Feb 12 20:52:32.751000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00040c2a8 items=0 ppid=1809 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313331623164646363616366656131613037653035323261643530 Feb 12 20:52:32.756000 audit: BPF prog-id=88 op=UNLOAD Feb 12 20:52:32.756000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { perfmon } for pid=1967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit[1967]: AVC avc: denied { bpf } for pid=1967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.756000 audit: BPF prog-id=89 op=LOAD Feb 12 20:52:32.756000 audit[1967]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00040c6b8 items=0 ppid=1809 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162313331623164646363616366656131613037653035323261643530 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.778000 audit: BPF prog-id=90 op=LOAD Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1849 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638666433626661366664643661313765323538663938623263356236 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1849 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638666433626661366664643661313765323538663938623263356236 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit: BPF prog-id=91 op=LOAD Feb 12 20:52:32.779000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0000243b0 items=0 ppid=1849 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638666433626661366664643661313765323538663938623263356236 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit: BPF prog-id=92 op=LOAD Feb 12 20:52:32.779000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0000243f8 items=0 ppid=1849 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638666433626661366664643661313765323538663938623263356236 Feb 12 20:52:32.779000 audit: BPF prog-id=92 op=UNLOAD Feb 12 20:52:32.779000 audit: BPF prog-id=91 op=UNLOAD Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { perfmon } for pid=1971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit[1971]: AVC avc: denied { bpf } for pid=1971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:32.779000 audit: BPF prog-id=93 op=LOAD Feb 12 20:52:32.779000 audit[1971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024808 items=0 ppid=1849 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:32.779000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638666433626661366664643661313765323538663938623263356236 Feb 12 20:52:32.841909 env[1145]: time="2024-02-12T20:52:32.841843430Z" level=info msg="StartContainer for \"ab131b1ddccacfea1a07e0522ad50c6e9a315296c43673932ae7623a67491d00\" returns successfully" Feb 12 20:52:32.852006 env[1145]: time="2024-02-12T20:52:32.851951732Z" level=info msg="StartContainer for \"399219f328ccfbf493e0614f6eaee1d802fc0f58949653818007915020f4c48e\" returns successfully" Feb 12 20:52:32.873657 env[1145]: time="2024-02-12T20:52:32.873597980Z" level=info msg="StartContainer for \"f8fd3bfa6fdd6a17e258f98b2c5b6cd6a12bd85079e4a8e7a883846f92d840c9\" returns successfully" Feb 12 20:52:33.494917 kubelet[1734]: I0212 20:52:33.494875 1734 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:35.964000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:35.964000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0002f87b0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:35.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:35.966000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:35.966000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0002e26a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:35.966000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:36.454000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:36.454000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c003cac000 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:52:36.454000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:52:36.455000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:36.455000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c000bd8640 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:52:36.455000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:52:36.456000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:36.456000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=45 a1=c003cac270 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:52:36.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:52:36.458000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:36.458000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c003cac450 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:52:36.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:52:36.462000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:36.462000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c0000e6020 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:52:36.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:52:36.463000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:36.463000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=52 a1=c003cadef0 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:52:36.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:52:36.657366 kubelet[1734]: E0212 20:52:36.657324 1734 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" not found" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:36.667178 kubelet[1734]: I0212 20:52:36.666974 1734 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:36.707976 kubelet[1734]: E0212 20:52:36.707730 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d02628813d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 348091709, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 348091709, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:36.766069 kubelet[1734]: E0212 20:52:36.765905 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d0267799f3", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 353275379, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 353275379, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:36.821488 kubelet[1734]: E0212 20:52:36.821379 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb6d88", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412246408, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412246408, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:36.876964 kubelet[1734]: E0212 20:52:36.876820 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb8aa5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412253861, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412253861, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:36.931898 kubelet[1734]: E0212 20:52:36.931760 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb9d8b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412258699, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412258699, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:36.989358 kubelet[1734]: E0212 20:52:36.989117 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb6d88", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412246408, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 461507589, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:37.046258 kubelet[1734]: E0212 20:52:37.046116 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb8aa5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412253861, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 461515862, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:37.102860 kubelet[1734]: E0212 20:52:37.102737 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb9d8b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412258699, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 461522143, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:37.163530 kubelet[1734]: E0212 20:52:37.163395 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb6d88", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412246408, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 668276160, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:37.348560 kubelet[1734]: I0212 20:52:37.348512 1734 apiserver.go:52] "Watching apiserver" Feb 12 20:52:37.358630 kubelet[1734]: I0212 20:52:37.358595 1734 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:52:37.430041 kubelet[1734]: I0212 20:52:37.429898 1734 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:52:37.562599 kubelet[1734]: E0212 20:52:37.562430 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb8aa5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412253861, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 668283172, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:37.964723 kubelet[1734]: E0212 20:52:37.964591 1734 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal.17b338d029fb9d8b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", UID:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 412258699, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 52, 30, 668287380, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 20:52:38.944000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:38.961197 kernel: kauditd_printk_skb: 420 callbacks suppressed Feb 12 20:52:38.961372 kernel: audit: type=1400 audit(1707771158.944:696): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:38.944000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb6720 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:38.944000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:39.040617 kernel: audit: type=1300 audit(1707771158.944:696): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb6720 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:39.040793 kernel: audit: type=1327 audit(1707771158.944:696): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:39.040846 kernel: audit: type=1400 audit(1707771158.949:697): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:38.949000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:38.949000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bb6860 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:39.103633 kernel: audit: type=1300 audit(1707771158.949:697): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bb6860 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:39.103818 kernel: audit: type=1327 audit(1707771158.949:697): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:38.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:38.951000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:39.158219 kernel: audit: type=1400 audit(1707771158.951:698): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:39.158432 kernel: audit: type=1300 audit(1707771158.951:698): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bb69a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:38.951000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000bb69a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:38.951000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:39.221275 kernel: audit: type=1327 audit(1707771158.951:698): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:39.221485 kernel: audit: type=1400 audit(1707771158.956:699): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:38.956000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:52:38.956000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000bb6f40 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:38.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:39.442714 systemd[1]: Reloading. Feb 12 20:52:39.531000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521299 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:52:39.531000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0001c7bc0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:52:39.531000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:52:39.609646 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2024-02-12T20:52:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:52:39.609701 /usr/lib/systemd/system-generators/torcx-generator[2064]: time="2024-02-12T20:52:39Z" level=info msg="torcx already run" Feb 12 20:52:39.703953 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:52:39.703984 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:52:39.733907 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.850000 audit: BPF prog-id=94 op=LOAD Feb 12 20:52:39.850000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:52:39.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.852000 audit: BPF prog-id=95 op=LOAD Feb 12 20:52:39.853000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit: BPF prog-id=96 op=LOAD Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.854000 audit: BPF prog-id=97 op=LOAD Feb 12 20:52:39.855000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:52:39.855000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.856000 audit: BPF prog-id=98 op=LOAD Feb 12 20:52:39.856000 audit: BPF prog-id=78 op=UNLOAD Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.861000 audit: BPF prog-id=99 op=LOAD Feb 12 20:52:39.861000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.862000 audit: BPF prog-id=100 op=LOAD Feb 12 20:52:39.862000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit: BPF prog-id=101 op=LOAD Feb 12 20:52:39.864000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit: BPF prog-id=102 op=LOAD Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.864000 audit: BPF prog-id=103 op=LOAD Feb 12 20:52:39.864000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:52:39.864000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit: BPF prog-id=104 op=LOAD Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.868000 audit: BPF prog-id=105 op=LOAD Feb 12 20:52:39.868000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:52:39.868000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit: BPF prog-id=106 op=LOAD Feb 12 20:52:39.869000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit: BPF prog-id=107 op=LOAD Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.869000 audit: BPF prog-id=108 op=LOAD Feb 12 20:52:39.869000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:52:39.869000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit: BPF prog-id=109 op=LOAD Feb 12 20:52:39.871000 audit: BPF prog-id=74 op=UNLOAD Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.872000 audit: BPF prog-id=110 op=LOAD Feb 12 20:52:39.872000 audit: BPF prog-id=82 op=UNLOAD Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.874000 audit: BPF prog-id=111 op=LOAD Feb 12 20:52:39.875000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.877000 audit: BPF prog-id=112 op=LOAD Feb 12 20:52:39.877000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.878000 audit: BPF prog-id=113 op=LOAD Feb 12 20:52:39.878000 audit: BPF prog-id=70 op=UNLOAD Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:39.880000 audit: BPF prog-id=114 op=LOAD Feb 12 20:52:39.880000 audit: BPF prog-id=90 op=UNLOAD Feb 12 20:52:39.901221 systemd[1]: Stopping kubelet.service... Feb 12 20:52:39.901938 kubelet[1734]: I0212 20:52:39.901872 1734 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:52:39.921110 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:52:39.921431 systemd[1]: Stopped kubelet.service. Feb 12 20:52:39.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:39.921538 systemd[1]: kubelet.service: Consumed 1.025s CPU time. Feb 12 20:52:39.924375 systemd[1]: Started kubelet.service. Feb 12 20:52:39.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:40.047202 kubelet[2102]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:52:40.047202 kubelet[2102]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:52:40.047202 kubelet[2102]: I0212 20:52:40.044292 2102 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:52:40.047202 kubelet[2102]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:52:40.047202 kubelet[2102]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:52:40.052782 kubelet[2102]: I0212 20:52:40.052739 2102 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:52:40.052782 kubelet[2102]: I0212 20:52:40.052776 2102 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:52:40.053067 kubelet[2102]: I0212 20:52:40.053055 2102 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:52:40.060732 kubelet[2102]: I0212 20:52:40.060701 2102 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:52:40.065182 kubelet[2102]: I0212 20:52:40.063350 2102 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:52:40.078661 kubelet[2102]: I0212 20:52:40.078620 2102 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:52:40.079393 kubelet[2102]: I0212 20:52:40.079047 2102 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:52:40.079393 kubelet[2102]: I0212 20:52:40.079212 2102 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:52:40.079393 kubelet[2102]: I0212 20:52:40.079276 2102 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:52:40.079393 kubelet[2102]: I0212 20:52:40.079299 2102 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:52:40.079393 kubelet[2102]: I0212 20:52:40.079381 2102 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:52:40.089084 kubelet[2102]: I0212 20:52:40.089051 2102 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:52:40.089084 kubelet[2102]: I0212 20:52:40.089091 2102 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:52:40.089338 kubelet[2102]: I0212 20:52:40.089122 2102 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:52:40.089338 kubelet[2102]: I0212 20:52:40.089141 2102 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:52:40.095842 kubelet[2102]: I0212 20:52:40.091845 2102 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:52:40.114129 kubelet[2102]: I0212 20:52:40.113997 2102 server.go:1186] "Started kubelet" Feb 12 20:52:40.119550 kubelet[2102]: I0212 20:52:40.119519 2102 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:52:40.120530 kubelet[2102]: I0212 20:52:40.120496 2102 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:52:40.121987 kubelet[2102]: E0212 20:52:40.121957 2102 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:52:40.122102 kubelet[2102]: E0212 20:52:40.121994 2102 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:52:40.123000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:40.123000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:52:40.123000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f00150 a1=c000abf560 a2=c000f00120 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:40.123000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:52:40.125759 kubelet[2102]: I0212 20:52:40.125737 2102 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:52:40.124000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:40.124000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:52:40.124000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e42280 a1=c000abf578 a2=c000f001e0 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:40.124000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:52:40.126866 kubelet[2102]: I0212 20:52:40.126844 2102 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:52:40.127244 kubelet[2102]: I0212 20:52:40.127226 2102 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:52:40.136192 kubelet[2102]: I0212 20:52:40.136165 2102 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:52:40.136804 kubelet[2102]: I0212 20:52:40.136778 2102 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:52:40.242948 kubelet[2102]: I0212 20:52:40.242768 2102 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.275192 kubelet[2102]: I0212 20:52:40.272518 2102 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.275192 kubelet[2102]: I0212 20:52:40.272619 2102 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.310852 kubelet[2102]: I0212 20:52:40.310820 2102 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:52:40.311084 kubelet[2102]: I0212 20:52:40.311066 2102 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:52:40.311260 kubelet[2102]: I0212 20:52:40.311243 2102 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:52:40.311623 kubelet[2102]: I0212 20:52:40.311599 2102 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:52:40.311771 kubelet[2102]: I0212 20:52:40.311754 2102 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:52:40.311873 kubelet[2102]: I0212 20:52:40.311858 2102 policy_none.go:49] "None policy: Start" Feb 12 20:52:40.314175 kubelet[2102]: I0212 20:52:40.312576 2102 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:52:40.315102 kubelet[2102]: I0212 20:52:40.315078 2102 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:52:40.315281 kubelet[2102]: I0212 20:52:40.315265 2102 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:52:40.315697 kubelet[2102]: I0212 20:52:40.315676 2102 state_mem.go:75] "Updated machine memory state" Feb 12 20:52:40.325318 kubelet[2102]: I0212 20:52:40.325289 2102 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:52:40.325461 kubelet[2102]: I0212 20:52:40.325367 2102 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:52:40.324000 audit[2102]: AVC avc: denied { mac_admin } for pid=2102 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:40.324000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:52:40.324000 audit[2102]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bc3290 a1=c001220bb8 a2=c000bc3260 a3=25 items=0 ppid=1 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:40.324000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:52:40.328585 kubelet[2102]: I0212 20:52:40.328553 2102 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:52:40.357044 kubelet[2102]: I0212 20:52:40.354548 2102 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:52:40.357044 kubelet[2102]: I0212 20:52:40.354578 2102 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:52:40.357044 kubelet[2102]: I0212 20:52:40.354600 2102 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:52:40.357044 kubelet[2102]: E0212 20:52:40.354666 2102 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 20:52:40.454912 kubelet[2102]: I0212 20:52:40.454771 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:40.455237 kubelet[2102]: I0212 20:52:40.455215 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:40.455409 kubelet[2102]: I0212 20:52:40.455393 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:40.538411 kubelet[2102]: I0212 20:52:40.538360 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e2b9bc220c354189f331c5df36defa3d-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e2b9bc220c354189f331c5df36defa3d\") " pod="kube-system/kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538614 kubelet[2102]: I0212 20:52:40.538443 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e5d4ae9a3ffc0885b350c7bee057750e-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e5d4ae9a3ffc0885b350c7bee057750e\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538614 kubelet[2102]: I0212 20:52:40.538484 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e5d4ae9a3ffc0885b350c7bee057750e-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e5d4ae9a3ffc0885b350c7bee057750e\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538614 kubelet[2102]: I0212 20:52:40.538539 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e5d4ae9a3ffc0885b350c7bee057750e-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"e5d4ae9a3ffc0885b350c7bee057750e\") " pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538614 kubelet[2102]: I0212 20:52:40.538595 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538874 kubelet[2102]: I0212 20:52:40.538635 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538874 kubelet[2102]: I0212 20:52:40.538708 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538874 kubelet[2102]: I0212 20:52:40.538777 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.538874 kubelet[2102]: I0212 20:52:40.538847 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/52fbcfff4c82b2322117e83f1a0ff224-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" (UID: \"52fbcfff4c82b2322117e83f1a0ff224\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:40.781716 update_engine[1133]: I0212 20:52:40.780864 1133 update_attempter.cc:509] Updating boot flags... Feb 12 20:52:41.110243 kubelet[2102]: I0212 20:52:41.110198 2102 apiserver.go:52] "Watching apiserver" Feb 12 20:52:41.137457 kubelet[2102]: I0212 20:52:41.137386 2102 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:52:41.157503 kubelet[2102]: I0212 20:52:41.157461 2102 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:52:41.387760 kubelet[2102]: E0212 20:52:41.387635 2102 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:41.507306 kubelet[2102]: E0212 20:52:41.507267 2102 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:41.704296 kubelet[2102]: E0212 20:52:41.704164 2102 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:52:42.538337 kubelet[2102]: I0212 20:52:42.538297 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" podStartSLOduration=2.53823114 pod.CreationTimestamp="2024-02-12 20:52:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:52:42.217983826 +0000 UTC m=+2.280255430" watchObservedRunningTime="2024-02-12 20:52:42.53823114 +0000 UTC m=+2.600502736" Feb 12 20:52:42.917438 kubelet[2102]: I0212 20:52:42.917388 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" podStartSLOduration=2.917324519 pod.CreationTimestamp="2024-02-12 20:52:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:52:42.53993262 +0000 UTC m=+2.602204485" watchObservedRunningTime="2024-02-12 20:52:42.917324519 +0000 UTC m=+2.979596113" Feb 12 20:52:43.302176 kubelet[2102]: I0212 20:52:43.302032 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" podStartSLOduration=3.301972392 pod.CreationTimestamp="2024-02-12 20:52:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:52:42.918758987 +0000 UTC m=+2.981030588" watchObservedRunningTime="2024-02-12 20:52:43.301972392 +0000 UTC m=+3.364243994" Feb 12 20:52:45.165263 sudo[1356]: pam_unix(sudo:session): session closed for user root Feb 12 20:52:45.164000 audit[1356]: USER_END pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:45.170992 kernel: kauditd_printk_skb: 263 callbacks suppressed Feb 12 20:52:45.171100 kernel: audit: type=1106 audit(1707771165.164:950): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:45.166000 audit[1356]: CRED_DISP pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:45.218870 kernel: audit: type=1104 audit(1707771165.166:951): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:52:45.219919 sshd[1353]: pam_unix(sshd:session): session closed for user core Feb 12 20:52:45.220000 audit[1353]: USER_END pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:45.225334 systemd[1]: sshd@6-10.128.0.39:22-147.75.109.163:54022.service: Deactivated successfully. Feb 12 20:52:45.226501 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:52:45.226716 systemd[1]: session-7.scope: Consumed 5.751s CPU time. Feb 12 20:52:45.229196 systemd-logind[1131]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:52:45.231449 systemd-logind[1131]: Removed session 7. Feb 12 20:52:45.220000 audit[1353]: CRED_DISP pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:45.279754 kernel: audit: type=1106 audit(1707771165.220:952): pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:45.279913 kernel: audit: type=1104 audit(1707771165.220:953): pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:52:45.279995 kernel: audit: type=1131 audit(1707771165.224:954): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.39:22-147.75.109.163:54022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:45.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.39:22-147.75.109.163:54022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:52:52.228164 kubelet[2102]: I0212 20:52:52.228111 2102 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 20:52:52.228749 env[1145]: time="2024-02-12T20:52:52.228634441Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:52:52.229196 kubelet[2102]: I0212 20:52:52.228916 2102 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 20:52:52.563002 kubelet[2102]: I0212 20:52:52.562862 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:52.571188 systemd[1]: Created slice kubepods-besteffort-podd96cb5d8_a2aa_4152_a484_fd1e9fc25c79.slice. Feb 12 20:52:52.641822 kubelet[2102]: I0212 20:52:52.641779 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d96cb5d8-a2aa-4152-a484-fd1e9fc25c79-kube-proxy\") pod \"kube-proxy-kxz4t\" (UID: \"d96cb5d8-a2aa-4152-a484-fd1e9fc25c79\") " pod="kube-system/kube-proxy-kxz4t" Feb 12 20:52:52.642064 kubelet[2102]: I0212 20:52:52.641952 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d96cb5d8-a2aa-4152-a484-fd1e9fc25c79-xtables-lock\") pod \"kube-proxy-kxz4t\" (UID: \"d96cb5d8-a2aa-4152-a484-fd1e9fc25c79\") " pod="kube-system/kube-proxy-kxz4t" Feb 12 20:52:52.642064 kubelet[2102]: I0212 20:52:52.642015 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kv497\" (UniqueName: \"kubernetes.io/projected/d96cb5d8-a2aa-4152-a484-fd1e9fc25c79-kube-api-access-kv497\") pod \"kube-proxy-kxz4t\" (UID: \"d96cb5d8-a2aa-4152-a484-fd1e9fc25c79\") " pod="kube-system/kube-proxy-kxz4t" Feb 12 20:52:52.642274 kubelet[2102]: I0212 20:52:52.642127 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d96cb5d8-a2aa-4152-a484-fd1e9fc25c79-lib-modules\") pod \"kube-proxy-kxz4t\" (UID: \"d96cb5d8-a2aa-4152-a484-fd1e9fc25c79\") " pod="kube-system/kube-proxy-kxz4t" Feb 12 20:52:52.840027 kubelet[2102]: I0212 20:52:52.839982 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:52.848699 systemd[1]: Created slice kubepods-besteffort-podc9e3a3c5_a982_4005_af46_5005d0d85d65.slice. Feb 12 20:52:52.880810 env[1145]: time="2024-02-12T20:52:52.880166174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kxz4t,Uid:d96cb5d8-a2aa-4152-a484-fd1e9fc25c79,Namespace:kube-system,Attempt:0,}" Feb 12 20:52:52.908556 env[1145]: time="2024-02-12T20:52:52.908464261Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:52.908747 env[1145]: time="2024-02-12T20:52:52.908577856Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:52.908747 env[1145]: time="2024-02-12T20:52:52.908620395Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:52.909038 env[1145]: time="2024-02-12T20:52:52.908959373Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8972c99172a92108567830afef05457d82d2385cc70ec790b0668bd2fa17a4b7 pid=2224 runtime=io.containerd.runc.v2 Feb 12 20:52:52.938912 systemd[1]: Started cri-containerd-8972c99172a92108567830afef05457d82d2385cc70ec790b0668bd2fa17a4b7.scope. Feb 12 20:52:52.945284 kubelet[2102]: I0212 20:52:52.945082 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c9e3a3c5-a982-4005-af46-5005d0d85d65-var-lib-calico\") pod \"tigera-operator-cfc98749c-spdr2\" (UID: \"c9e3a3c5-a982-4005-af46-5005d0d85d65\") " pod="tigera-operator/tigera-operator-cfc98749c-spdr2" Feb 12 20:52:52.945284 kubelet[2102]: I0212 20:52:52.945222 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbdbw\" (UniqueName: \"kubernetes.io/projected/c9e3a3c5-a982-4005-af46-5005d0d85d65-kube-api-access-sbdbw\") pod \"tigera-operator-cfc98749c-spdr2\" (UID: \"c9e3a3c5-a982-4005-af46-5005d0d85d65\") " pod="tigera-operator/tigera-operator-cfc98749c-spdr2" Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978218 kernel: audit: type=1400 audit(1707771172.955:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.000259 kernel: audit: type=1400 audit(1707771172.955:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.042529 kernel: audit: type=1400 audit(1707771172.955:957): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.042782 kernel: audit: type=1400 audit(1707771172.955:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.064065 kernel: audit: type=1400 audit(1707771172.955:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.109453 kernel: audit: type=1400 audit(1707771172.955:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.109594 kernel: audit: type=1400 audit(1707771172.955:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.114765 env[1145]: time="2024-02-12T20:52:53.114710259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-kxz4t,Uid:d96cb5d8-a2aa-4152-a484-fd1e9fc25c79,Namespace:kube-system,Attempt:0,} returns sandbox id \"8972c99172a92108567830afef05457d82d2385cc70ec790b0668bd2fa17a4b7\"" Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.123416 env[1145]: time="2024-02-12T20:52:53.123373622Z" level=info msg="CreateContainer within sandbox \"8972c99172a92108567830afef05457d82d2385cc70ec790b0668bd2fa17a4b7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:52:53.141251 kernel: audit: type=1400 audit(1707771172.955:962): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.142489 kernel: audit: type=1400 audit(1707771172.955:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.153467 env[1145]: time="2024-02-12T20:52:53.153420973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-spdr2,Uid:c9e3a3c5-a982-4005-af46-5005d0d85d65,Namespace:tigera-operator,Attempt:0,}" Feb 12 20:52:52.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.182421 kernel: audit: type=1400 audit(1707771172.976:964): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.976000 audit: BPF prog-id=115 op=LOAD Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2224 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:52.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373263393931373261393231303835363738333061666566303534 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2224 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:52.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373263393931373261393231303835363738333061666566303534 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.977000 audit: BPF prog-id=116 op=LOAD Feb 12 20:52:52.977000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e40a0 items=0 ppid=2224 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:52.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373263393931373261393231303835363738333061666566303534 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.978000 audit: BPF prog-id=117 op=LOAD Feb 12 20:52:52.978000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e40e8 items=0 ppid=2224 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:52.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373263393931373261393231303835363738333061666566303534 Feb 12 20:52:52.998000 audit: BPF prog-id=117 op=UNLOAD Feb 12 20:52:52.998000 audit: BPF prog-id=116 op=UNLOAD Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { perfmon } for pid=2234 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit[2234]: AVC avc: denied { bpf } for pid=2234 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:52.998000 audit: BPF prog-id=118 op=LOAD Feb 12 20:52:52.998000 audit[2234]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e44f8 items=0 ppid=2224 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:52.998000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839373263393931373261393231303835363738333061666566303534 Feb 12 20:52:53.202528 env[1145]: time="2024-02-12T20:52:53.202460860Z" level=info msg="CreateContainer within sandbox \"8972c99172a92108567830afef05457d82d2385cc70ec790b0668bd2fa17a4b7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"feedf388705dec69dbe3d01e39a763bd3eac98362c8a64f9bc35606e1aa4d2f9\"" Feb 12 20:52:53.203630 env[1145]: time="2024-02-12T20:52:53.203584965Z" level=info msg="StartContainer for \"feedf388705dec69dbe3d01e39a763bd3eac98362c8a64f9bc35606e1aa4d2f9\"" Feb 12 20:52:53.217734 env[1145]: time="2024-02-12T20:52:53.217640056Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:53.217925 env[1145]: time="2024-02-12T20:52:53.217699192Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:53.217925 env[1145]: time="2024-02-12T20:52:53.217756648Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:53.218114 env[1145]: time="2024-02-12T20:52:53.217997877Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ce40420c36441229e6876554d5a19bd7ccac38127aa17e313ffd0ad15852ed3 pid=2273 runtime=io.containerd.runc.v2 Feb 12 20:52:53.251202 systemd[1]: Started cri-containerd-6ce40420c36441229e6876554d5a19bd7ccac38127aa17e313ffd0ad15852ed3.scope. Feb 12 20:52:53.267887 systemd[1]: Started cri-containerd-feedf388705dec69dbe3d01e39a763bd3eac98362c8a64f9bc35606e1aa4d2f9.scope. Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.282000 audit: BPF prog-id=119 op=LOAD Feb 12 20:52:53.283000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.283000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2273 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653430343230633336343431323239653638373635353464356131 Feb 12 20:52:53.283000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.283000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2273 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653430343230633336343431323239653638373635353464356131 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.284000 audit: BPF prog-id=120 op=LOAD Feb 12 20:52:53.284000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00009a5f0 items=0 ppid=2273 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653430343230633336343431323239653638373635353464356131 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.285000 audit: BPF prog-id=121 op=LOAD Feb 12 20:52:53.285000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00009a638 items=0 ppid=2273 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653430343230633336343431323239653638373635353464356131 Feb 12 20:52:53.286000 audit: BPF prog-id=121 op=UNLOAD Feb 12 20:52:53.286000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.287000 audit: BPF prog-id=122 op=LOAD Feb 12 20:52:53.287000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00009aa48 items=0 ppid=2273 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663653430343230633336343431323239653638373635353464356131 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fb9882ffac8 items=0 ppid=2224 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665656466333838373035646563363964626533643031653339613736 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.299000 audit: BPF prog-id=123 op=LOAD Feb 12 20:52:53.299000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002cdba8 items=0 ppid=2224 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665656466333838373035646563363964626533643031653339613736 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit: BPF prog-id=124 op=LOAD Feb 12 20:52:53.300000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002cdbf8 items=0 ppid=2224 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665656466333838373035646563363964626533643031653339613736 Feb 12 20:52:53.300000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:52:53.300000 audit: BPF prog-id=123 op=UNLOAD Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:53.300000 audit: BPF prog-id=125 op=LOAD Feb 12 20:52:53.300000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002cdc88 items=0 ppid=2224 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665656466333838373035646563363964626533643031653339613736 Feb 12 20:52:53.324507 env[1145]: time="2024-02-12T20:52:53.324445783Z" level=info msg="StartContainer for \"feedf388705dec69dbe3d01e39a763bd3eac98362c8a64f9bc35606e1aa4d2f9\" returns successfully" Feb 12 20:52:53.351349 env[1145]: time="2024-02-12T20:52:53.351299818Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-spdr2,Uid:c9e3a3c5-a982-4005-af46-5005d0d85d65,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6ce40420c36441229e6876554d5a19bd7ccac38127aa17e313ffd0ad15852ed3\"" Feb 12 20:52:53.358132 kubelet[2102]: E0212 20:52:53.356873 2102 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 12 20:52:53.358648 env[1145]: time="2024-02-12T20:52:53.357623628Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 20:52:53.444000 audit[2361]: NETFILTER_CFG table=mangle:59 family=2 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.444000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdacb6c180 a2=0 a3=7ffdacb6c16c items=0 ppid=2313 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:52:53.444000 audit[2360]: NETFILTER_CFG table=mangle:60 family=10 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.444000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd480aaca0 a2=0 a3=31030 items=0 ppid=2313 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:52:53.449000 audit[2362]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.449000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdab186480 a2=0 a3=7ffdab18646c items=0 ppid=2313 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:52:53.452000 audit[2363]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.452000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd847061f0 a2=0 a3=7ffd847061dc items=0 ppid=2313 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:52:53.454000 audit[2364]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.454000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff900260d0 a2=0 a3=7fff900260bc items=0 ppid=2313 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:52:53.456000 audit[2365]: NETFILTER_CFG table=filter:64 family=2 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.456000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4c60a8c0 a2=0 a3=7ffe4c60a8ac items=0 ppid=2313 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:52:53.533000 audit[2366]: NETFILTER_CFG table=filter:65 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.533000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffde0e471f0 a2=0 a3=7ffde0e471dc items=0 ppid=2313 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:52:53.538000 audit[2368]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.538000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff762596f0 a2=0 a3=7fff762596dc items=0 ppid=2313 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:52:53.543000 audit[2371]: NETFILTER_CFG table=filter:67 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.543000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffda2617400 a2=0 a3=7ffda26173ec items=0 ppid=2313 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:52:53.545000 audit[2372]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.545000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca6c820c0 a2=0 a3=7ffca6c820ac items=0 ppid=2313 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:52:53.550000 audit[2374]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.550000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3f906b70 a2=0 a3=7ffe3f906b5c items=0 ppid=2313 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:52:53.553000 audit[2375]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.553000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff58cfefb0 a2=0 a3=7fff58cfef9c items=0 ppid=2313 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.553000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:52:53.559000 audit[2377]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.559000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcfcd521b0 a2=0 a3=7ffcfcd5219c items=0 ppid=2313 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.559000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:52:53.564000 audit[2380]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.564000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe42d79f80 a2=0 a3=7ffe42d79f6c items=0 ppid=2313 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.564000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:52:53.566000 audit[2381]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.566000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb1e79280 a2=0 a3=7fffb1e7926c items=0 ppid=2313 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:52:53.570000 audit[2383]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.570000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe507352e0 a2=0 a3=7ffe507352cc items=0 ppid=2313 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:52:53.572000 audit[2384]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.572000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe40130e0 a2=0 a3=7fffe40130cc items=0 ppid=2313 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.572000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:52:53.575000 audit[2386]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.575000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbc7a1430 a2=0 a3=7fffbc7a141c items=0 ppid=2313 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:52:53.581000 audit[2389]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.581000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6e06e5b0 a2=0 a3=7ffd6e06e59c items=0 ppid=2313 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:52:53.586000 audit[2392]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.586000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffee2348b0 a2=0 a3=7fffee23489c items=0 ppid=2313 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:52:53.587000 audit[2393]: NETFILTER_CFG table=nat:79 family=2 entries=1 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.587000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd50d0a420 a2=0 a3=7ffd50d0a40c items=0 ppid=2313 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:52:53.591000 audit[2395]: NETFILTER_CFG table=nat:80 family=2 entries=1 op=nft_register_rule pid=2395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.591000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd207c6f70 a2=0 a3=7ffd207c6f5c items=0 ppid=2313 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:52:53.596000 audit[2398]: NETFILTER_CFG table=nat:81 family=2 entries=1 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:52:53.596000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe733bd6e0 a2=0 a3=7ffe733bd6cc items=0 ppid=2313 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:52:53.613000 audit[2402]: NETFILTER_CFG table=filter:82 family=2 entries=6 op=nft_register_rule pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:53.613000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffda12676b0 a2=0 a3=7ffda126769c items=0 ppid=2313 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:53.621000 audit[2402]: NETFILTER_CFG table=nat:83 family=2 entries=17 op=nft_register_chain pid=2402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:53.621000 audit[2402]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffda12676b0 a2=0 a3=7ffda126769c items=0 ppid=2313 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.621000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:53.626000 audit[2407]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.626000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcbaf1abc0 a2=0 a3=7ffcbaf1abac items=0 ppid=2313 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.626000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:52:53.631000 audit[2409]: NETFILTER_CFG table=filter:85 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.631000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd1af9fa0 a2=0 a3=7ffdd1af9f8c items=0 ppid=2313 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:52:53.636000 audit[2412]: NETFILTER_CFG table=filter:86 family=10 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.636000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff825345e0 a2=0 a3=7fff825345cc items=0 ppid=2313 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.636000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:52:53.638000 audit[2413]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.638000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff739ed70 a2=0 a3=7ffff739ed5c items=0 ppid=2313 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:52:53.641000 audit[2415]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.641000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff42c5d380 a2=0 a3=7fff42c5d36c items=0 ppid=2313 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.641000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:52:53.643000 audit[2416]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.643000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9c9cfa70 a2=0 a3=7fff9c9cfa5c items=0 ppid=2313 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.643000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:52:53.647000 audit[2418]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.647000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe9c72e9c0 a2=0 a3=7ffe9c72e9ac items=0 ppid=2313 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:52:53.652000 audit[2421]: NETFILTER_CFG table=filter:91 family=10 entries=2 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.652000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe8f5ecb50 a2=0 a3=7ffe8f5ecb3c items=0 ppid=2313 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:52:53.655000 audit[2422]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2422 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.655000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe98c0d4c0 a2=0 a3=7ffe98c0d4ac items=0 ppid=2313 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.655000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:52:53.659000 audit[2424]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.659000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb3c0b920 a2=0 a3=7fffb3c0b90c items=0 ppid=2313 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.659000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:52:53.660000 audit[2425]: NETFILTER_CFG table=filter:94 family=10 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.660000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7f1483e0 a2=0 a3=7ffd7f1483cc items=0 ppid=2313 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:52:53.664000 audit[2427]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.664000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe10f21e90 a2=0 a3=7ffe10f21e7c items=0 ppid=2313 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:52:53.670000 audit[2430]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.670000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcda4a9810 a2=0 a3=7ffcda4a97fc items=0 ppid=2313 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:52:53.675000 audit[2433]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.675000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc23ecab50 a2=0 a3=7ffc23ecab3c items=0 ppid=2313 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.675000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:52:53.677000 audit[2434]: NETFILTER_CFG table=nat:98 family=10 entries=1 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.677000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9be3df20 a2=0 a3=7ffe9be3df0c items=0 ppid=2313 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:52:53.680000 audit[2436]: NETFILTER_CFG table=nat:99 family=10 entries=2 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.680000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9a3c6310 a2=0 a3=7ffc9a3c62fc items=0 ppid=2313 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:52:53.686000 audit[2439]: NETFILTER_CFG table=nat:100 family=10 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:52:53.686000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff60b3dba0 a2=0 a3=7fff60b3db8c items=0 ppid=2313 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:52:53.694000 audit[2443]: NETFILTER_CFG table=filter:101 family=10 entries=3 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:52:53.694000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffde1c6c990 a2=0 a3=7ffde1c6c97c items=0 ppid=2313 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.694000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:53.695000 audit[2443]: NETFILTER_CFG table=nat:102 family=10 entries=10 op=nft_register_chain pid=2443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:52:53.695000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffde1c6c990 a2=0 a3=7ffde1c6c97c items=0 ppid=2313 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:53.695000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:54.165023 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1745169069.mount: Deactivated successfully. Feb 12 20:52:55.511347 env[1145]: time="2024-02-12T20:52:55.511265064Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:55.515102 env[1145]: time="2024-02-12T20:52:55.515029151Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:55.518124 env[1145]: time="2024-02-12T20:52:55.518062627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:55.521341 env[1145]: time="2024-02-12T20:52:55.521291592Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:52:55.522412 env[1145]: time="2024-02-12T20:52:55.522371675Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 20:52:55.527134 env[1145]: time="2024-02-12T20:52:55.527030105Z" level=info msg="CreateContainer within sandbox \"6ce40420c36441229e6876554d5a19bd7ccac38127aa17e313ffd0ad15852ed3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 20:52:55.550615 env[1145]: time="2024-02-12T20:52:55.550548824Z" level=info msg="CreateContainer within sandbox \"6ce40420c36441229e6876554d5a19bd7ccac38127aa17e313ffd0ad15852ed3\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"7b85eef9065f6941de1fd173cd87c08ad5716003570b0583b2300369bd7db653\"" Feb 12 20:52:55.551349 env[1145]: time="2024-02-12T20:52:55.551243798Z" level=info msg="StartContainer for \"7b85eef9065f6941de1fd173cd87c08ad5716003570b0583b2300369bd7db653\"" Feb 12 20:52:55.583363 systemd[1]: Started cri-containerd-7b85eef9065f6941de1fd173cd87c08ad5716003570b0583b2300369bd7db653.scope. Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.604000 audit: BPF prog-id=126 op=LOAD Feb 12 20:52:55.605000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.605000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2273 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:55.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383565656639303635663639343164653166643137336364383763 Feb 12 20:52:55.605000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.605000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2273 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:55.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383565656639303635663639343164653166643137336364383763 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit: BPF prog-id=127 op=LOAD Feb 12 20:52:55.606000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aa000 items=0 ppid=2273 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:55.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383565656639303635663639343164653166643137336364383763 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.606000 audit: BPF prog-id=128 op=LOAD Feb 12 20:52:55.606000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aa048 items=0 ppid=2273 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:55.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383565656639303635663639343164653166643137336364383763 Feb 12 20:52:55.607000 audit: BPF prog-id=128 op=UNLOAD Feb 12 20:52:55.607000 audit: BPF prog-id=127 op=UNLOAD Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:55.607000 audit: BPF prog-id=129 op=LOAD Feb 12 20:52:55.607000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003aa458 items=0 ppid=2273 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:55.607000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762383565656639303635663639343164653166643137336364383763 Feb 12 20:52:55.629387 env[1145]: time="2024-02-12T20:52:55.629334732Z" level=info msg="StartContainer for \"7b85eef9065f6941de1fd173cd87c08ad5716003570b0583b2300369bd7db653\" returns successfully" Feb 12 20:52:56.424592 kubelet[2102]: I0212 20:52:56.424527 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-kxz4t" podStartSLOduration=4.424478811 pod.CreationTimestamp="2024-02-12 20:52:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:52:53.421530635 +0000 UTC m=+13.483802238" watchObservedRunningTime="2024-02-12 20:52:56.424478811 +0000 UTC m=+16.486750414" Feb 12 20:52:57.861000 audit[2509]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=2509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:57.861000 audit[2509]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fffc2da7120 a2=0 a3=7fffc2da710c items=0 ppid=2313 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:57.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:57.863000 audit[2509]: NETFILTER_CFG table=nat:104 family=2 entries=20 op=nft_register_rule pid=2509 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:57.863000 audit[2509]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fffc2da7120 a2=0 a3=7fffc2da710c items=0 ppid=2313 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:57.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:57.913000 audit[2535]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:57.913000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7fff6f1f31d0 a2=0 a3=7fff6f1f31bc items=0 ppid=2313 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:57.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:57.914000 audit[2535]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=2535 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:57.914000 audit[2535]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7fff6f1f31d0 a2=0 a3=7fff6f1f31bc items=0 ppid=2313 pid=2535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:57.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:57.950203 kubelet[2102]: I0212 20:52:57.950134 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-spdr2" podStartSLOduration=-9.223372030904722e+09 pod.CreationTimestamp="2024-02-12 20:52:52 +0000 UTC" firstStartedPulling="2024-02-12 20:52:53.353212073 +0000 UTC m=+13.415483670" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:52:56.425506871 +0000 UTC m=+16.487778473" watchObservedRunningTime="2024-02-12 20:52:57.950052809 +0000 UTC m=+18.012324411" Feb 12 20:52:57.950880 kubelet[2102]: I0212 20:52:57.950504 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:57.959298 systemd[1]: Created slice kubepods-besteffort-pod246e5c76_1e7e_456b_91e2_3efa896f0645.slice. Feb 12 20:52:57.996771 kubelet[2102]: I0212 20:52:57.996731 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-snrp7\" (UniqueName: \"kubernetes.io/projected/246e5c76-1e7e-456b-91e2-3efa896f0645-kube-api-access-snrp7\") pod \"calico-typha-797f56b4b6-lz7t9\" (UID: \"246e5c76-1e7e-456b-91e2-3efa896f0645\") " pod="calico-system/calico-typha-797f56b4b6-lz7t9" Feb 12 20:52:57.997087 kubelet[2102]: I0212 20:52:57.997067 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/246e5c76-1e7e-456b-91e2-3efa896f0645-typha-certs\") pod \"calico-typha-797f56b4b6-lz7t9\" (UID: \"246e5c76-1e7e-456b-91e2-3efa896f0645\") " pod="calico-system/calico-typha-797f56b4b6-lz7t9" Feb 12 20:52:57.997266 kubelet[2102]: I0212 20:52:57.997249 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/246e5c76-1e7e-456b-91e2-3efa896f0645-tigera-ca-bundle\") pod \"calico-typha-797f56b4b6-lz7t9\" (UID: \"246e5c76-1e7e-456b-91e2-3efa896f0645\") " pod="calico-system/calico-typha-797f56b4b6-lz7t9" Feb 12 20:52:58.079589 kubelet[2102]: I0212 20:52:58.079546 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:58.088571 systemd[1]: Created slice kubepods-besteffort-pod776e98b1_1b5c_4f7c_b6e5_34dbdbf3c3e5.slice. Feb 12 20:52:58.196987 kubelet[2102]: I0212 20:52:58.196844 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:52:58.198588 kubelet[2102]: E0212 20:52:58.197529 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:52:58.198931 kubelet[2102]: I0212 20:52:58.198906 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-xtables-lock\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199216 kubelet[2102]: I0212 20:52:58.199163 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-tigera-ca-bundle\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199346 kubelet[2102]: I0212 20:52:58.199243 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-flexvol-driver-host\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199346 kubelet[2102]: I0212 20:52:58.199281 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-lib-modules\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199346 kubelet[2102]: I0212 20:52:58.199317 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-policysync\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199556 kubelet[2102]: I0212 20:52:58.199350 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-var-lib-calico\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199556 kubelet[2102]: I0212 20:52:58.199386 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-cni-bin-dir\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199556 kubelet[2102]: I0212 20:52:58.199424 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-cni-net-dir\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199556 kubelet[2102]: I0212 20:52:58.199459 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-cni-log-dir\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199556 kubelet[2102]: I0212 20:52:58.199502 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-node-certs\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199834 kubelet[2102]: I0212 20:52:58.199538 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-var-run-calico\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.199834 kubelet[2102]: I0212 20:52:58.199581 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h6vqx\" (UniqueName: \"kubernetes.io/projected/776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5-kube-api-access-h6vqx\") pod \"calico-node-g2hng\" (UID: \"776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5\") " pod="calico-system/calico-node-g2hng" Feb 12 20:52:58.264222 env[1145]: time="2024-02-12T20:52:58.264131006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-797f56b4b6-lz7t9,Uid:246e5c76-1e7e-456b-91e2-3efa896f0645,Namespace:calico-system,Attempt:0,}" Feb 12 20:52:58.294607 env[1145]: time="2024-02-12T20:52:58.294521695Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:58.294803 env[1145]: time="2024-02-12T20:52:58.294618396Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:58.294803 env[1145]: time="2024-02-12T20:52:58.294657213Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:58.294937 env[1145]: time="2024-02-12T20:52:58.294854912Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0cd3ea4422cec82548c281c472314d98c3356e2e89b3a68bb6a9bd47fec49d9 pid=2545 runtime=io.containerd.runc.v2 Feb 12 20:52:58.303656 kubelet[2102]: I0212 20:52:58.303549 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gthnp\" (UniqueName: \"kubernetes.io/projected/88583db7-8063-476f-967e-ffbf294ccd01-kube-api-access-gthnp\") pod \"csi-node-driver-qlf55\" (UID: \"88583db7-8063-476f-967e-ffbf294ccd01\") " pod="calico-system/csi-node-driver-qlf55" Feb 12 20:52:58.303656 kubelet[2102]: I0212 20:52:58.303657 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/88583db7-8063-476f-967e-ffbf294ccd01-kubelet-dir\") pod \"csi-node-driver-qlf55\" (UID: \"88583db7-8063-476f-967e-ffbf294ccd01\") " pod="calico-system/csi-node-driver-qlf55" Feb 12 20:52:58.303974 kubelet[2102]: I0212 20:52:58.303757 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/88583db7-8063-476f-967e-ffbf294ccd01-varrun\") pod \"csi-node-driver-qlf55\" (UID: \"88583db7-8063-476f-967e-ffbf294ccd01\") " pod="calico-system/csi-node-driver-qlf55" Feb 12 20:52:58.303974 kubelet[2102]: I0212 20:52:58.303797 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/88583db7-8063-476f-967e-ffbf294ccd01-registration-dir\") pod \"csi-node-driver-qlf55\" (UID: \"88583db7-8063-476f-967e-ffbf294ccd01\") " pod="calico-system/csi-node-driver-qlf55" Feb 12 20:52:58.303974 kubelet[2102]: I0212 20:52:58.303834 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/88583db7-8063-476f-967e-ffbf294ccd01-socket-dir\") pod \"csi-node-driver-qlf55\" (UID: \"88583db7-8063-476f-967e-ffbf294ccd01\") " pod="calico-system/csi-node-driver-qlf55" Feb 12 20:52:58.306980 kubelet[2102]: E0212 20:52:58.306948 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.306980 kubelet[2102]: W0212 20:52:58.306975 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.307213 kubelet[2102]: E0212 20:52:58.307004 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.310619 kubelet[2102]: E0212 20:52:58.310590 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.310619 kubelet[2102]: W0212 20:52:58.310614 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.310810 kubelet[2102]: E0212 20:52:58.310645 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.318862 kubelet[2102]: E0212 20:52:58.318710 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.318862 kubelet[2102]: W0212 20:52:58.318729 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.318862 kubelet[2102]: E0212 20:52:58.318860 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.324178 kubelet[2102]: E0212 20:52:58.323675 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.324178 kubelet[2102]: W0212 20:52:58.323695 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.324178 kubelet[2102]: E0212 20:52:58.323818 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.324178 kubelet[2102]: E0212 20:52:58.324018 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.324178 kubelet[2102]: W0212 20:52:58.324031 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.324178 kubelet[2102]: E0212 20:52:58.324133 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.324623 kubelet[2102]: E0212 20:52:58.324334 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.324623 kubelet[2102]: W0212 20:52:58.324346 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.324623 kubelet[2102]: E0212 20:52:58.324459 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.324793 kubelet[2102]: E0212 20:52:58.324639 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.324793 kubelet[2102]: W0212 20:52:58.324650 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.324793 kubelet[2102]: E0212 20:52:58.324758 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.325023 kubelet[2102]: E0212 20:52:58.324947 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.325023 kubelet[2102]: W0212 20:52:58.324959 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.325131 kubelet[2102]: E0212 20:52:58.325101 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.326179 kubelet[2102]: E0212 20:52:58.325305 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.326179 kubelet[2102]: W0212 20:52:58.325320 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.326179 kubelet[2102]: E0212 20:52:58.325431 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.326179 kubelet[2102]: E0212 20:52:58.325606 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.326179 kubelet[2102]: W0212 20:52:58.325616 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.326179 kubelet[2102]: E0212 20:52:58.325715 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.326179 kubelet[2102]: E0212 20:52:58.325876 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.326179 kubelet[2102]: W0212 20:52:58.325885 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.326179 kubelet[2102]: E0212 20:52:58.325989 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.326745 kubelet[2102]: E0212 20:52:58.326227 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.326745 kubelet[2102]: W0212 20:52:58.326239 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.326745 kubelet[2102]: E0212 20:52:58.326348 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.326745 kubelet[2102]: E0212 20:52:58.326521 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.326745 kubelet[2102]: W0212 20:52:58.326531 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.326745 kubelet[2102]: E0212 20:52:58.326630 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.327069 kubelet[2102]: E0212 20:52:58.326801 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.327069 kubelet[2102]: W0212 20:52:58.326812 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.327069 kubelet[2102]: E0212 20:52:58.326833 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.327256 kubelet[2102]: E0212 20:52:58.327183 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.327256 kubelet[2102]: W0212 20:52:58.327195 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.327386 kubelet[2102]: E0212 20:52:58.327300 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.329177 kubelet[2102]: E0212 20:52:58.327479 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.329177 kubelet[2102]: W0212 20:52:58.327493 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.329177 kubelet[2102]: E0212 20:52:58.327599 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.329177 kubelet[2102]: E0212 20:52:58.327764 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.329177 kubelet[2102]: W0212 20:52:58.327774 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.329177 kubelet[2102]: E0212 20:52:58.327876 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.329177 kubelet[2102]: E0212 20:52:58.328073 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.329177 kubelet[2102]: W0212 20:52:58.328085 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.333175 kubelet[2102]: E0212 20:52:58.331275 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.333175 kubelet[2102]: E0212 20:52:58.331552 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.333175 kubelet[2102]: W0212 20:52:58.331566 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.333175 kubelet[2102]: E0212 20:52:58.331590 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.333175 kubelet[2102]: E0212 20:52:58.331962 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.333175 kubelet[2102]: W0212 20:52:58.331975 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.333175 kubelet[2102]: E0212 20:52:58.332000 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.333706 kubelet[2102]: E0212 20:52:58.333554 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.333706 kubelet[2102]: W0212 20:52:58.333569 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.333706 kubelet[2102]: E0212 20:52:58.333590 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.346991 systemd[1]: Started cri-containerd-e0cd3ea4422cec82548c281c472314d98c3356e2e89b3a68bb6a9bd47fec49d9.scope. Feb 12 20:52:58.405382 kubelet[2102]: E0212 20:52:58.405348 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.405612 kubelet[2102]: W0212 20:52:58.405590 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.405762 kubelet[2102]: E0212 20:52:58.405746 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.406334 kubelet[2102]: E0212 20:52:58.406303 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.406490 kubelet[2102]: W0212 20:52:58.406471 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.406615 kubelet[2102]: E0212 20:52:58.406602 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.407118 kubelet[2102]: E0212 20:52:58.407100 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.407294 kubelet[2102]: W0212 20:52:58.407277 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.407446 kubelet[2102]: E0212 20:52:58.407432 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.407928 kubelet[2102]: E0212 20:52:58.407911 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.408067 kubelet[2102]: W0212 20:52:58.408051 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.410257 kubelet[2102]: E0212 20:52:58.410238 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.410759 kubelet[2102]: E0212 20:52:58.410730 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.410903 kubelet[2102]: W0212 20:52:58.410885 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.411046 kubelet[2102]: E0212 20:52:58.411033 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.411533 kubelet[2102]: E0212 20:52:58.411505 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.411676 kubelet[2102]: W0212 20:52:58.411659 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.411812 kubelet[2102]: E0212 20:52:58.411799 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.414337 kubelet[2102]: E0212 20:52:58.414318 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.414515 kubelet[2102]: W0212 20:52:58.414497 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.414649 kubelet[2102]: E0212 20:52:58.414636 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.415075 kubelet[2102]: E0212 20:52:58.415059 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.415627 kubelet[2102]: W0212 20:52:58.415604 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.415805 kubelet[2102]: E0212 20:52:58.415789 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.416304 kubelet[2102]: E0212 20:52:58.416289 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.416802 kubelet[2102]: W0212 20:52:58.416781 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.416976 kubelet[2102]: E0212 20:52:58.416961 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.419445 kubelet[2102]: E0212 20:52:58.419419 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.419445 kubelet[2102]: W0212 20:52:58.419442 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.419609 kubelet[2102]: E0212 20:52:58.419464 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.419783 kubelet[2102]: E0212 20:52:58.419762 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.419783 kubelet[2102]: W0212 20:52:58.419782 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.419940 kubelet[2102]: E0212 20:52:58.419800 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.421959 kubelet[2102]: E0212 20:52:58.421935 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.421959 kubelet[2102]: W0212 20:52:58.421956 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.422123 kubelet[2102]: E0212 20:52:58.422076 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.422306 kubelet[2102]: E0212 20:52:58.422285 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.422306 kubelet[2102]: W0212 20:52:58.422305 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.422465 kubelet[2102]: E0212 20:52:58.422424 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.422629 kubelet[2102]: E0212 20:52:58.422606 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.422629 kubelet[2102]: W0212 20:52:58.422627 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.422764 kubelet[2102]: E0212 20:52:58.422741 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.422988 kubelet[2102]: E0212 20:52:58.422965 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.422988 kubelet[2102]: W0212 20:52:58.422985 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.423135 kubelet[2102]: E0212 20:52:58.423097 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.423455 kubelet[2102]: E0212 20:52:58.423431 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.423455 kubelet[2102]: W0212 20:52:58.423452 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.423619 kubelet[2102]: E0212 20:52:58.423568 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.423772 kubelet[2102]: E0212 20:52:58.423750 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.423772 kubelet[2102]: W0212 20:52:58.423771 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.423911 kubelet[2102]: E0212 20:52:58.423878 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.424090 kubelet[2102]: E0212 20:52:58.424068 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.424090 kubelet[2102]: W0212 20:52:58.424088 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.424273 kubelet[2102]: E0212 20:52:58.424243 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.424486 kubelet[2102]: E0212 20:52:58.424463 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.424486 kubelet[2102]: W0212 20:52:58.424483 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.424649 kubelet[2102]: E0212 20:52:58.424628 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.424860 kubelet[2102]: E0212 20:52:58.424837 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.424860 kubelet[2102]: W0212 20:52:58.424857 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.424996 kubelet[2102]: E0212 20:52:58.424981 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.425222 kubelet[2102]: E0212 20:52:58.425200 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.425222 kubelet[2102]: W0212 20:52:58.425220 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.425394 kubelet[2102]: E0212 20:52:58.425330 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.425531 kubelet[2102]: E0212 20:52:58.425510 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.425531 kubelet[2102]: W0212 20:52:58.425531 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.425690 kubelet[2102]: E0212 20:52:58.425638 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.425854 kubelet[2102]: E0212 20:52:58.425831 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.425854 kubelet[2102]: W0212 20:52:58.425852 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.426012 kubelet[2102]: E0212 20:52:58.426000 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.426311 kubelet[2102]: E0212 20:52:58.426291 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.426311 kubelet[2102]: W0212 20:52:58.426311 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.426477 kubelet[2102]: E0212 20:52:58.426336 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.426744 kubelet[2102]: E0212 20:52:58.426721 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.426744 kubelet[2102]: W0212 20:52:58.426741 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.426898 kubelet[2102]: E0212 20:52:58.426766 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.427086 kubelet[2102]: E0212 20:52:58.427065 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.427086 kubelet[2102]: W0212 20:52:58.427084 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.427248 kubelet[2102]: E0212 20:52:58.427102 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.526710 kernel: kauditd_printk_skb: 348 callbacks suppressed Feb 12 20:52:58.526914 kernel: audit: type=1400 audit(1707771178.499:1063): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.527856 kubelet[2102]: E0212 20:52:58.527827 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.528051 kubelet[2102]: W0212 20:52:58.528029 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.528187 kubelet[2102]: E0212 20:52:58.528169 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.528608 kubelet[2102]: E0212 20:52:58.528591 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.528747 kubelet[2102]: W0212 20:52:58.528729 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.528865 kubelet[2102]: E0212 20:52:58.528851 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554325 kernel: audit: type=1400 audit(1707771178.499:1064): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.578187 kernel: audit: type=1400 audit(1707771178.499:1065): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.600178 kernel: audit: type=1400 audit(1707771178.499:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.625210 kernel: audit: type=1400 audit(1707771178.499:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.625295 kubelet[2102]: E0212 20:52:58.604634 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.625295 kubelet[2102]: W0212 20:52:58.604653 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.625295 kubelet[2102]: E0212 20:52:58.604678 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.646889 kubelet[2102]: E0212 20:52:58.629894 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.646889 kubelet[2102]: W0212 20:52:58.629915 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.646889 kubelet[2102]: E0212 20:52:58.629951 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.647188 kernel: audit: type=1400 audit(1707771178.499:1068): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.689759 kernel: audit: type=1400 audit(1707771178.499:1069): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.689902 kernel: audit: type=1400 audit(1707771178.499:1070): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.703677 env[1145]: time="2024-02-12T20:52:58.698759319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-g2hng,Uid:776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5,Namespace:calico-system,Attempt:0,}" Feb 12 20:52:58.717172 kernel: audit: type=1400 audit(1707771178.499:1071): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.719536 env[1145]: time="2024-02-12T20:52:58.719491394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-797f56b4b6-lz7t9,Uid:246e5c76-1e7e-456b-91e2-3efa896f0645,Namespace:calico-system,Attempt:0,} returns sandbox id \"e0cd3ea4422cec82548c281c472314d98c3356e2e89b3a68bb6a9bd47fec49d9\"" Feb 12 20:52:58.721796 env[1145]: time="2024-02-12T20:52:58.721756048Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 20:52:58.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.743264 kernel: audit: type=1400 audit(1707771178.552:1072): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.744226 kubelet[2102]: E0212 20:52:58.744104 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.744226 kubelet[2102]: W0212 20:52:58.744129 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.744226 kubelet[2102]: E0212 20:52:58.744179 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.552000 audit: BPF prog-id=130 op=LOAD Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2545 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636433656134343232636563383235343863323831633437323331 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2545 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636433656134343232636563383235343863323831633437323331 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit: BPF prog-id=131 op=LOAD Feb 12 20:52:58.553000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000304fc0 items=0 ppid=2545 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636433656134343232636563383235343863323831633437323331 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.553000 audit: BPF prog-id=132 op=LOAD Feb 12 20:52:58.553000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000305008 items=0 ppid=2545 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636433656134343232636563383235343863323831633437323331 Feb 12 20:52:58.554000 audit: BPF prog-id=132 op=UNLOAD Feb 12 20:52:58.554000 audit: BPF prog-id=131 op=UNLOAD Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { perfmon } for pid=2559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit[2559]: AVC avc: denied { bpf } for pid=2559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.554000 audit: BPF prog-id=133 op=LOAD Feb 12 20:52:58.554000 audit[2559]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000305418 items=0 ppid=2545 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530636433656134343232636563383235343863323831633437323331 Feb 12 20:52:58.756815 env[1145]: time="2024-02-12T20:52:58.756714641Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:52:58.757001 env[1145]: time="2024-02-12T20:52:58.756846577Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:52:58.757001 env[1145]: time="2024-02-12T20:52:58.756915090Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:52:58.757303 env[1145]: time="2024-02-12T20:52:58.757204243Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c pid=2640 runtime=io.containerd.runc.v2 Feb 12 20:52:58.781444 kubelet[2102]: E0212 20:52:58.777686 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:52:58.781444 kubelet[2102]: W0212 20:52:58.777710 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:52:58.781444 kubelet[2102]: E0212 20:52:58.777742 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:52:58.784025 systemd[1]: Started cri-containerd-30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c.scope. Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit: BPF prog-id=134 op=LOAD Feb 12 20:52:58.820000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.820000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2640 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613461653061613230366463326433613136373438336337323961 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2640 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613461653061613230366463326433613136373438336337323961 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit: BPF prog-id=135 op=LOAD Feb 12 20:52:58.821000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ccaa0 items=0 ppid=2640 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613461653061613230366463326433613136373438336337323961 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit: BPF prog-id=136 op=LOAD Feb 12 20:52:58.821000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ccae8 items=0 ppid=2640 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613461653061613230366463326433613136373438336337323961 Feb 12 20:52:58.821000 audit: BPF prog-id=136 op=UNLOAD Feb 12 20:52:58.821000 audit: BPF prog-id=135 op=UNLOAD Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:52:58.821000 audit: BPF prog-id=137 op=LOAD Feb 12 20:52:58.821000 audit[2649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ccef8 items=0 ppid=2640 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330613461653061613230366463326433613136373438336337323961 Feb 12 20:52:58.847021 env[1145]: time="2024-02-12T20:52:58.846967113Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-g2hng,Uid:776e98b1-1b5c-4f7c-b6e5-34dbdbf3c3e5,Namespace:calico-system,Attempt:0,} returns sandbox id \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\"" Feb 12 20:52:58.993000 audit[2702]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:58.993000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=4732 a0=3 a1=7ffd4861c0f0 a2=0 a3=7ffd4861c0dc items=0 ppid=2313 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:58.994000 audit[2702]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=2702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:52:58.994000 audit[2702]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffd4861c0f0 a2=0 a3=7ffd4861c0dc items=0 ppid=2313 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:52:58.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:52:59.803832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1312601184.mount: Deactivated successfully. Feb 12 20:53:00.357570 kubelet[2102]: E0212 20:53:00.357520 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:01.560587 env[1145]: time="2024-02-12T20:53:01.560520254Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:01.563331 env[1145]: time="2024-02-12T20:53:01.563283284Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:01.569869 env[1145]: time="2024-02-12T20:53:01.569801097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:01.574780 env[1145]: time="2024-02-12T20:53:01.574721562Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:01.575341 env[1145]: time="2024-02-12T20:53:01.575294440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 20:53:01.578049 env[1145]: time="2024-02-12T20:53:01.578014004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:53:01.603905 env[1145]: time="2024-02-12T20:53:01.603807004Z" level=info msg="CreateContainer within sandbox \"e0cd3ea4422cec82548c281c472314d98c3356e2e89b3a68bb6a9bd47fec49d9\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:53:01.621921 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1182442558.mount: Deactivated successfully. Feb 12 20:53:01.631076 env[1145]: time="2024-02-12T20:53:01.631011858Z" level=info msg="CreateContainer within sandbox \"e0cd3ea4422cec82548c281c472314d98c3356e2e89b3a68bb6a9bd47fec49d9\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5d9be1763c841f5ff6718dd3acdd4b02f1014930814c9697fa243b7e00317630\"" Feb 12 20:53:01.635127 env[1145]: time="2024-02-12T20:53:01.634878808Z" level=info msg="StartContainer for \"5d9be1763c841f5ff6718dd3acdd4b02f1014930814c9697fa243b7e00317630\"" Feb 12 20:53:01.668866 systemd[1]: Started cri-containerd-5d9be1763c841f5ff6718dd3acdd4b02f1014930814c9697fa243b7e00317630.scope. Feb 12 20:53:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.695000 audit: BPF prog-id=138 op=LOAD Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2545 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:01.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564396265313736336338343166356666363731386464336163646434 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2545 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:01.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564396265313736336338343166356666363731386464336163646434 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit: BPF prog-id=139 op=LOAD Feb 12 20:53:01.696000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219310 items=0 ppid=2545 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:01.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564396265313736336338343166356666363731386464336163646434 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit: BPF prog-id=140 op=LOAD Feb 12 20:53:01.696000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219358 items=0 ppid=2545 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:01.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564396265313736336338343166356666363731386464336163646434 Feb 12 20:53:01.696000 audit: BPF prog-id=140 op=UNLOAD Feb 12 20:53:01.696000 audit: BPF prog-id=139 op=UNLOAD Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { perfmon } for pid=2713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit[2713]: AVC avc: denied { bpf } for pid=2713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:01.696000 audit: BPF prog-id=141 op=LOAD Feb 12 20:53:01.696000 audit[2713]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219768 items=0 ppid=2545 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:01.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564396265313736336338343166356666363731386464336163646434 Feb 12 20:53:01.756686 env[1145]: time="2024-02-12T20:53:01.756618967Z" level=info msg="StartContainer for \"5d9be1763c841f5ff6718dd3acdd4b02f1014930814c9697fa243b7e00317630\" returns successfully" Feb 12 20:53:02.357209 kubelet[2102]: E0212 20:53:02.355538 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:02.495121 kubelet[2102]: E0212 20:53:02.495073 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.495121 kubelet[2102]: W0212 20:53:02.495099 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.495121 kubelet[2102]: E0212 20:53:02.495128 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.495509 kubelet[2102]: E0212 20:53:02.495483 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.495509 kubelet[2102]: W0212 20:53:02.495499 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.495673 kubelet[2102]: E0212 20:53:02.495521 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.495963 kubelet[2102]: E0212 20:53:02.495937 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.495963 kubelet[2102]: W0212 20:53:02.495954 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.496121 kubelet[2102]: E0212 20:53:02.495973 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.496379 kubelet[2102]: E0212 20:53:02.496355 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.496379 kubelet[2102]: W0212 20:53:02.496374 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.496565 kubelet[2102]: E0212 20:53:02.496394 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.496764 kubelet[2102]: E0212 20:53:02.496730 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.496764 kubelet[2102]: W0212 20:53:02.496749 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.496924 kubelet[2102]: E0212 20:53:02.496769 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.497443 kubelet[2102]: E0212 20:53:02.497022 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.497443 kubelet[2102]: W0212 20:53:02.497040 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.497443 kubelet[2102]: E0212 20:53:02.497057 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.497443 kubelet[2102]: E0212 20:53:02.497411 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.497443 kubelet[2102]: W0212 20:53:02.497425 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.497443 kubelet[2102]: E0212 20:53:02.497444 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.497874 kubelet[2102]: E0212 20:53:02.497705 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.497874 kubelet[2102]: W0212 20:53:02.497717 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.497874 kubelet[2102]: E0212 20:53:02.497735 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.498033 kubelet[2102]: E0212 20:53:02.497975 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.498033 kubelet[2102]: W0212 20:53:02.497987 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.498033 kubelet[2102]: E0212 20:53:02.498004 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.498317 kubelet[2102]: E0212 20:53:02.498295 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.498317 kubelet[2102]: W0212 20:53:02.498313 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.498484 kubelet[2102]: E0212 20:53:02.498331 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.498599 kubelet[2102]: E0212 20:53:02.498579 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.498599 kubelet[2102]: W0212 20:53:02.498596 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.498777 kubelet[2102]: E0212 20:53:02.498616 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.499409 kubelet[2102]: E0212 20:53:02.499257 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.499409 kubelet[2102]: W0212 20:53:02.499274 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.499409 kubelet[2102]: E0212 20:53:02.499292 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.574825 kubelet[2102]: E0212 20:53:02.574789 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.574825 kubelet[2102]: W0212 20:53:02.574815 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.575127 kubelet[2102]: E0212 20:53:02.574846 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.575306 kubelet[2102]: E0212 20:53:02.575272 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.575306 kubelet[2102]: W0212 20:53:02.575293 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.575491 kubelet[2102]: E0212 20:53:02.575323 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.575825 kubelet[2102]: E0212 20:53:02.575798 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.576001 kubelet[2102]: W0212 20:53:02.575958 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.576088 kubelet[2102]: E0212 20:53:02.576010 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.576449 kubelet[2102]: E0212 20:53:02.576427 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.576449 kubelet[2102]: W0212 20:53:02.576445 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.576708 kubelet[2102]: E0212 20:53:02.576658 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.576786 kubelet[2102]: E0212 20:53:02.576726 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.576786 kubelet[2102]: W0212 20:53:02.576737 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.577011 kubelet[2102]: E0212 20:53:02.576967 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.577224 kubelet[2102]: E0212 20:53:02.577202 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.577224 kubelet[2102]: W0212 20:53:02.577220 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.577485 kubelet[2102]: E0212 20:53:02.577432 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.577620 kubelet[2102]: E0212 20:53:02.577502 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.577620 kubelet[2102]: W0212 20:53:02.577514 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.577620 kubelet[2102]: E0212 20:53:02.577537 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.577984 kubelet[2102]: E0212 20:53:02.577964 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.577984 kubelet[2102]: W0212 20:53:02.577980 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.578132 kubelet[2102]: E0212 20:53:02.578014 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.578421 kubelet[2102]: E0212 20:53:02.578401 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.578421 kubelet[2102]: W0212 20:53:02.578419 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.578605 kubelet[2102]: E0212 20:53:02.578588 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.579085 kubelet[2102]: E0212 20:53:02.578687 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.579233 kubelet[2102]: W0212 20:53:02.579190 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.579358 kubelet[2102]: E0212 20:53:02.579340 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.579529 kubelet[2102]: E0212 20:53:02.579511 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.579611 kubelet[2102]: W0212 20:53:02.579530 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.579715 kubelet[2102]: E0212 20:53:02.579695 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.579857 kubelet[2102]: E0212 20:53:02.579839 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.579857 kubelet[2102]: W0212 20:53:02.579855 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.579995 kubelet[2102]: E0212 20:53:02.579878 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.580210 kubelet[2102]: E0212 20:53:02.580192 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.580340 kubelet[2102]: W0212 20:53:02.580300 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.580340 kubelet[2102]: E0212 20:53:02.580335 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.580680 kubelet[2102]: E0212 20:53:02.580658 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.580680 kubelet[2102]: W0212 20:53:02.580676 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.580834 kubelet[2102]: E0212 20:53:02.580703 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.581243 kubelet[2102]: E0212 20:53:02.581223 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.581243 kubelet[2102]: W0212 20:53:02.581240 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.581449 kubelet[2102]: E0212 20:53:02.581432 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.581576 kubelet[2102]: E0212 20:53:02.581512 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.581670 kubelet[2102]: W0212 20:53:02.581575 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.581670 kubelet[2102]: E0212 20:53:02.581595 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.581913 kubelet[2102]: E0212 20:53:02.581894 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.581913 kubelet[2102]: W0212 20:53:02.581910 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.582067 kubelet[2102]: E0212 20:53:02.581928 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:02.585525 kubelet[2102]: E0212 20:53:02.582661 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:02.585525 kubelet[2102]: W0212 20:53:02.582678 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:02.585525 kubelet[2102]: E0212 20:53:02.582700 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.434850 kubelet[2102]: I0212 20:53:03.434748 2102 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:53:03.508014 kubelet[2102]: E0212 20:53:03.507975 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.508014 kubelet[2102]: W0212 20:53:03.508003 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.508367 kubelet[2102]: E0212 20:53:03.508032 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.508511 kubelet[2102]: E0212 20:53:03.508367 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.508511 kubelet[2102]: W0212 20:53:03.508382 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.508511 kubelet[2102]: E0212 20:53:03.508404 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.508714 kubelet[2102]: E0212 20:53:03.508690 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.508714 kubelet[2102]: W0212 20:53:03.508710 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.508848 kubelet[2102]: E0212 20:53:03.508729 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.509571 kubelet[2102]: E0212 20:53:03.509041 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.509571 kubelet[2102]: W0212 20:53:03.509057 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.509571 kubelet[2102]: E0212 20:53:03.509077 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.509571 kubelet[2102]: E0212 20:53:03.509393 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.509571 kubelet[2102]: W0212 20:53:03.509407 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.509571 kubelet[2102]: E0212 20:53:03.509431 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.509960 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.511174 kubelet[2102]: W0212 20:53:03.509986 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.510001 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.510350 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.511174 kubelet[2102]: W0212 20:53:03.510363 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.510381 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.510632 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.511174 kubelet[2102]: W0212 20:53:03.510643 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.510660 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.511174 kubelet[2102]: E0212 20:53:03.510905 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.511746 kubelet[2102]: W0212 20:53:03.510917 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.511746 kubelet[2102]: E0212 20:53:03.510935 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.512782 kubelet[2102]: E0212 20:53:03.512030 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.512782 kubelet[2102]: W0212 20:53:03.512048 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.512782 kubelet[2102]: E0212 20:53:03.512067 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.512782 kubelet[2102]: E0212 20:53:03.512392 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.512782 kubelet[2102]: W0212 20:53:03.512404 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.512782 kubelet[2102]: E0212 20:53:03.512424 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.512782 kubelet[2102]: E0212 20:53:03.512687 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.512782 kubelet[2102]: W0212 20:53:03.512699 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.512782 kubelet[2102]: E0212 20:53:03.512717 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.581936 kubelet[2102]: E0212 20:53:03.581900 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.581936 kubelet[2102]: W0212 20:53:03.581930 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.582254 kubelet[2102]: E0212 20:53:03.581961 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.582547 kubelet[2102]: E0212 20:53:03.582525 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.582547 kubelet[2102]: W0212 20:53:03.582545 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.582703 kubelet[2102]: E0212 20:53:03.582574 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.582966 kubelet[2102]: E0212 20:53:03.582947 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.582966 kubelet[2102]: W0212 20:53:03.582966 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.583130 kubelet[2102]: E0212 20:53:03.582993 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.583358 kubelet[2102]: E0212 20:53:03.583338 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.583435 kubelet[2102]: W0212 20:53:03.583358 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.583435 kubelet[2102]: E0212 20:53:03.583383 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.583697 kubelet[2102]: E0212 20:53:03.583678 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.583774 kubelet[2102]: W0212 20:53:03.583697 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.583856 kubelet[2102]: E0212 20:53:03.583808 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.584008 kubelet[2102]: E0212 20:53:03.583989 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.584088 kubelet[2102]: W0212 20:53:03.584010 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.584172 kubelet[2102]: E0212 20:53:03.584128 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.584373 kubelet[2102]: E0212 20:53:03.584353 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.584373 kubelet[2102]: W0212 20:53:03.584373 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.584511 kubelet[2102]: E0212 20:53:03.584494 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.584731 kubelet[2102]: E0212 20:53:03.584706 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.584731 kubelet[2102]: W0212 20:53:03.584725 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.584868 kubelet[2102]: E0212 20:53:03.584764 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.585105 kubelet[2102]: E0212 20:53:03.585085 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.585105 kubelet[2102]: W0212 20:53:03.585104 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.585260 kubelet[2102]: E0212 20:53:03.585127 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.585682 kubelet[2102]: E0212 20:53:03.585662 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.585682 kubelet[2102]: W0212 20:53:03.585682 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.585835 kubelet[2102]: E0212 20:53:03.585791 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.586009 kubelet[2102]: E0212 20:53:03.585989 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.586009 kubelet[2102]: W0212 20:53:03.586008 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.586176 kubelet[2102]: E0212 20:53:03.586117 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.586347 kubelet[2102]: E0212 20:53:03.586329 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.586421 kubelet[2102]: W0212 20:53:03.586347 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.586421 kubelet[2102]: E0212 20:53:03.586372 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.586712 kubelet[2102]: E0212 20:53:03.586692 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.586712 kubelet[2102]: W0212 20:53:03.586712 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.586926 kubelet[2102]: E0212 20:53:03.586736 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.587080 kubelet[2102]: E0212 20:53:03.587060 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.587195 kubelet[2102]: W0212 20:53:03.587079 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.587195 kubelet[2102]: E0212 20:53:03.587104 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.587930 kubelet[2102]: E0212 20:53:03.587909 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.587930 kubelet[2102]: W0212 20:53:03.587930 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.588103 kubelet[2102]: E0212 20:53:03.587955 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.588313 kubelet[2102]: E0212 20:53:03.588295 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.588399 kubelet[2102]: W0212 20:53:03.588314 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.588399 kubelet[2102]: E0212 20:53:03.588338 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.588794 kubelet[2102]: E0212 20:53:03.588774 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.588794 kubelet[2102]: W0212 20:53:03.588793 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.588962 kubelet[2102]: E0212 20:53:03.588816 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.589110 kubelet[2102]: E0212 20:53:03.589091 2102 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:53:03.589203 kubelet[2102]: W0212 20:53:03.589110 2102 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:53:03.589203 kubelet[2102]: E0212 20:53:03.589128 2102 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:53:03.674013 env[1145]: time="2024-02-12T20:53:03.673951595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:03.677272 env[1145]: time="2024-02-12T20:53:03.677224930Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:03.680124 env[1145]: time="2024-02-12T20:53:03.680077848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:03.682934 env[1145]: time="2024-02-12T20:53:03.682890859Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:03.684295 env[1145]: time="2024-02-12T20:53:03.684232949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:53:03.691204 env[1145]: time="2024-02-12T20:53:03.689998268Z" level=info msg="CreateContainer within sandbox \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:53:03.731346 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2071053960.mount: Deactivated successfully. Feb 12 20:53:03.739696 env[1145]: time="2024-02-12T20:53:03.739639152Z" level=info msg="CreateContainer within sandbox \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3\"" Feb 12 20:53:03.740629 env[1145]: time="2024-02-12T20:53:03.740594259Z" level=info msg="StartContainer for \"e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3\"" Feb 12 20:53:03.777358 systemd[1]: Started cri-containerd-e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3.scope. Feb 12 20:53:03.791909 systemd[1]: run-containerd-runc-k8s.io-e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3-runc.2KMO4W.mount: Deactivated successfully. Feb 12 20:53:03.861006 kernel: kauditd_printk_skb: 167 callbacks suppressed Feb 12 20:53:03.861205 kernel: audit: type=1400 audit(1707771183.833:1119): avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f566d37c2f8 items=0 ppid=2640 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:03.918292 kernel: audit: type=1300 audit(1707771183.833:1119): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f566d37c2f8 items=0 ppid=2640 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:03.918875 systemd[1]: cri-containerd-e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3.scope: Deactivated successfully. Feb 12 20:53:03.924390 env[1145]: time="2024-02-12T20:53:03.924123270Z" level=info msg="StartContainer for \"e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3\" returns successfully" Feb 12 20:53:03.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623332393066313430613966383461343134303230666538333134 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.975057 kernel: audit: type=1327 audit(1707771183.833:1119): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623332393066313430613966383461343134303230666538333134 Feb 12 20:53:03.975227 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.999680 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.999792 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:04.038595 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:04.059621 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:04.207714 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:04.207807 kernel: audit: type=1400 audit(1707771183.833:1120): avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.833000 audit: BPF prog-id=142 op=LOAD Feb 12 20:53:03.833000 audit[2815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000024908 items=0 ppid=2640 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:03.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623332393066313430613966383461343134303230666538333134 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit: BPF prog-id=143 op=LOAD Feb 12 20:53:03.860000 audit[2815]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024958 items=0 ppid=2640 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:03.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623332393066313430613966383461343134303230666538333134 Feb 12 20:53:03.860000 audit: BPF prog-id=143 op=UNLOAD Feb 12 20:53:03.860000 audit: BPF prog-id=142 op=UNLOAD Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { perfmon } for pid=2815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit[2815]: AVC avc: denied { bpf } for pid=2815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:03.860000 audit: BPF prog-id=144 op=LOAD Feb 12 20:53:03.860000 audit[2815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0000249e8 items=0 ppid=2640 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:03.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539623332393066313430613966383461343134303230666538333134 Feb 12 20:53:03.922000 audit: BPF prog-id=144 op=UNLOAD Feb 12 20:53:04.356234 kubelet[2102]: E0212 20:53:04.355317 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:04.454231 kubelet[2102]: I0212 20:53:04.454195 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-797f56b4b6-lz7t9" podStartSLOduration=-9.223372029400663e+09 pod.CreationTimestamp="2024-02-12 20:52:57 +0000 UTC" firstStartedPulling="2024-02-12 20:52:58.721122933 +0000 UTC m=+18.783394521" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:53:02.447453403 +0000 UTC m=+22.509725008" watchObservedRunningTime="2024-02-12 20:53:04.45411176 +0000 UTC m=+24.516383362" Feb 12 20:53:04.592320 env[1145]: time="2024-02-12T20:53:04.592208650Z" level=info msg="shim disconnected" id=e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3 Feb 12 20:53:04.592320 env[1145]: time="2024-02-12T20:53:04.592297506Z" level=warning msg="cleaning up after shim disconnected" id=e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3 namespace=k8s.io Feb 12 20:53:04.592320 env[1145]: time="2024-02-12T20:53:04.592314350Z" level=info msg="cleaning up dead shim" Feb 12 20:53:04.603623 env[1145]: time="2024-02-12T20:53:04.603567879Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:53:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2860 runtime=io.containerd.runc.v2\n" Feb 12 20:53:04.723446 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e9b3290f140a9f84a414020fe83141b9b0d49b168ae144409a02abccd4820cf3-rootfs.mount: Deactivated successfully. Feb 12 20:53:05.444318 env[1145]: time="2024-02-12T20:53:05.444269196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:53:06.356291 kubelet[2102]: E0212 20:53:06.355733 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:06.420044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount100311180.mount: Deactivated successfully. Feb 12 20:53:08.357083 kubelet[2102]: E0212 20:53:08.357035 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:10.357206 kubelet[2102]: E0212 20:53:10.357165 2102 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:10.468237 env[1145]: time="2024-02-12T20:53:10.468169795Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:10.471558 env[1145]: time="2024-02-12T20:53:10.471511097Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:10.474166 env[1145]: time="2024-02-12T20:53:10.474099960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:10.476746 env[1145]: time="2024-02-12T20:53:10.476678356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:10.477816 env[1145]: time="2024-02-12T20:53:10.477763446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:53:10.490474 env[1145]: time="2024-02-12T20:53:10.490428165Z" level=info msg="CreateContainer within sandbox \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:53:10.513052 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount457750882.mount: Deactivated successfully. Feb 12 20:53:10.527289 env[1145]: time="2024-02-12T20:53:10.527230720Z" level=info msg="CreateContainer within sandbox \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc\"" Feb 12 20:53:10.528190 env[1145]: time="2024-02-12T20:53:10.528128337Z" level=info msg="StartContainer for \"76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc\"" Feb 12 20:53:10.569386 systemd[1]: Started cri-containerd-76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc.scope. Feb 12 20:53:10.622961 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:53:10.623136 kernel: audit: type=1400 audit(1707771190.595:1126): avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f1a6c4184d8 items=0 ppid=2640 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:10.656295 kernel: audit: type=1300 audit(1707771190.595:1126): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f1a6c4184d8 items=0 ppid=2640 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:10.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643734303633653630383537366663373836393964363631346461 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.712449 kernel: audit: type=1327 audit(1707771190.595:1126): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643734303633653630383537366663373836393964363631346461 Feb 12 20:53:10.712845 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.755539 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.756401 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.798881 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.799058 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.799483 env[1145]: time="2024-02-12T20:53:10.799421730Z" level=info msg="StartContainer for \"76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc\" returns successfully" Feb 12 20:53:10.820044 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.820254 kernel: audit: type=1400 audit(1707771190.595:1127): avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.595000 audit: BPF prog-id=145 op=LOAD Feb 12 20:53:10.595000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002985d8 items=0 ppid=2640 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:10.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643734303633653630383537366663373836393964363631346461 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.655000 audit: BPF prog-id=146 op=LOAD Feb 12 20:53:10.655000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000298628 items=0 ppid=2640 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:10.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643734303633653630383537366663373836393964363631346461 Feb 12 20:53:10.656000 audit: BPF prog-id=146 op=UNLOAD Feb 12 20:53:10.656000 audit: BPF prog-id=145 op=UNLOAD Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { perfmon } for pid=2885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit[2885]: AVC avc: denied { bpf } for pid=2885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:10.656000 audit: BPF prog-id=147 op=LOAD Feb 12 20:53:10.656000 audit[2885]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002986b8 items=0 ppid=2640 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:10.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736643734303633653630383537366663373836393964363631346461 Feb 12 20:53:11.674714 env[1145]: time="2024-02-12T20:53:11.674622446Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:53:11.678879 systemd[1]: cri-containerd-76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc.scope: Deactivated successfully. Feb 12 20:53:11.683000 audit: BPF prog-id=147 op=UNLOAD Feb 12 20:53:11.708382 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc-rootfs.mount: Deactivated successfully. Feb 12 20:53:11.783335 kubelet[2102]: I0212 20:53:11.782106 2102 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:53:11.808921 kubelet[2102]: I0212 20:53:11.808872 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:53:11.810685 kubelet[2102]: I0212 20:53:11.810650 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:53:11.812751 kubelet[2102]: I0212 20:53:11.812722 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:53:11.818981 systemd[1]: Created slice kubepods-burstable-pod1c9bbdfa_5067_4e56_ab91_7515695ee5f0.slice. Feb 12 20:53:11.834014 systemd[1]: Created slice kubepods-besteffort-pod4c3a7e78_0095_45b8_b59e_db5a730f12ba.slice. Feb 12 20:53:11.843722 systemd[1]: Created slice kubepods-burstable-pod78477bf0_d44a_434d_bcec_6b3a484f17bd.slice. Feb 12 20:53:11.984519 kubelet[2102]: I0212 20:53:11.984344 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jc66v\" (UniqueName: \"kubernetes.io/projected/1c9bbdfa-5067-4e56-ab91-7515695ee5f0-kube-api-access-jc66v\") pod \"coredns-787d4945fb-kd6xq\" (UID: \"1c9bbdfa-5067-4e56-ab91-7515695ee5f0\") " pod="kube-system/coredns-787d4945fb-kd6xq" Feb 12 20:53:11.984519 kubelet[2102]: I0212 20:53:11.984420 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fgg77\" (UniqueName: \"kubernetes.io/projected/78477bf0-d44a-434d-bcec-6b3a484f17bd-kube-api-access-fgg77\") pod \"coredns-787d4945fb-svvh9\" (UID: \"78477bf0-d44a-434d-bcec-6b3a484f17bd\") " pod="kube-system/coredns-787d4945fb-svvh9" Feb 12 20:53:11.984519 kubelet[2102]: I0212 20:53:11.984461 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4fprk\" (UniqueName: \"kubernetes.io/projected/4c3a7e78-0095-45b8-b59e-db5a730f12ba-kube-api-access-4fprk\") pod \"calico-kube-controllers-656d5c54f4-njlfx\" (UID: \"4c3a7e78-0095-45b8-b59e-db5a730f12ba\") " pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" Feb 12 20:53:11.984519 kubelet[2102]: I0212 20:53:11.984506 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1c9bbdfa-5067-4e56-ab91-7515695ee5f0-config-volume\") pod \"coredns-787d4945fb-kd6xq\" (UID: \"1c9bbdfa-5067-4e56-ab91-7515695ee5f0\") " pod="kube-system/coredns-787d4945fb-kd6xq" Feb 12 20:53:11.985096 kubelet[2102]: I0212 20:53:11.984546 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/78477bf0-d44a-434d-bcec-6b3a484f17bd-config-volume\") pod \"coredns-787d4945fb-svvh9\" (UID: \"78477bf0-d44a-434d-bcec-6b3a484f17bd\") " pod="kube-system/coredns-787d4945fb-svvh9" Feb 12 20:53:11.985096 kubelet[2102]: I0212 20:53:11.984581 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4c3a7e78-0095-45b8-b59e-db5a730f12ba-tigera-ca-bundle\") pod \"calico-kube-controllers-656d5c54f4-njlfx\" (UID: \"4c3a7e78-0095-45b8-b59e-db5a730f12ba\") " pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" Feb 12 20:53:12.141282 env[1145]: time="2024-02-12T20:53:12.141212456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656d5c54f4-njlfx,Uid:4c3a7e78-0095-45b8-b59e-db5a730f12ba,Namespace:calico-system,Attempt:0,}" Feb 12 20:53:12.221825 env[1145]: time="2024-02-12T20:53:12.221445992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-svvh9,Uid:78477bf0-d44a-434d-bcec-6b3a484f17bd,Namespace:kube-system,Attempt:0,}" Feb 12 20:53:12.363993 systemd[1]: Created slice kubepods-besteffort-pod88583db7_8063_476f_967e_ffbf294ccd01.slice. Feb 12 20:53:12.367640 env[1145]: time="2024-02-12T20:53:12.367561586Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qlf55,Uid:88583db7-8063-476f-967e-ffbf294ccd01,Namespace:calico-system,Attempt:0,}" Feb 12 20:53:12.428916 env[1145]: time="2024-02-12T20:53:12.428857867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kd6xq,Uid:1c9bbdfa-5067-4e56-ab91-7515695ee5f0,Namespace:kube-system,Attempt:0,}" Feb 12 20:53:12.489055 env[1145]: time="2024-02-12T20:53:12.488990189Z" level=info msg="shim disconnected" id=76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc Feb 12 20:53:12.489055 env[1145]: time="2024-02-12T20:53:12.489051614Z" level=warning msg="cleaning up after shim disconnected" id=76d74063e608576fc78699d6614da1e6e3e367e91b95e55165ba4b3154d8a7dc namespace=k8s.io Feb 12 20:53:12.489377 env[1145]: time="2024-02-12T20:53:12.489066190Z" level=info msg="cleaning up dead shim" Feb 12 20:53:12.503580 env[1145]: time="2024-02-12T20:53:12.503510958Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:53:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2933 runtime=io.containerd.runc.v2\n" Feb 12 20:53:12.745470 env[1145]: time="2024-02-12T20:53:12.741316472Z" level=error msg="Failed to destroy network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.745090 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127-shm.mount: Deactivated successfully. Feb 12 20:53:12.747360 env[1145]: time="2024-02-12T20:53:12.747287902Z" level=error msg="encountered an error cleaning up failed sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.747502 env[1145]: time="2024-02-12T20:53:12.747393828Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qlf55,Uid:88583db7-8063-476f-967e-ffbf294ccd01,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.750956 kubelet[2102]: E0212 20:53:12.747762 2102 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.750956 kubelet[2102]: E0212 20:53:12.747911 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qlf55" Feb 12 20:53:12.750956 kubelet[2102]: E0212 20:53:12.747974 2102 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qlf55" Feb 12 20:53:12.751410 kubelet[2102]: E0212 20:53:12.748102 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qlf55_calico-system(88583db7-8063-476f-967e-ffbf294ccd01)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qlf55_calico-system(88583db7-8063-476f-967e-ffbf294ccd01)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:12.762451 env[1145]: time="2024-02-12T20:53:12.762376627Z" level=error msg="Failed to destroy network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.765847 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f-shm.mount: Deactivated successfully. Feb 12 20:53:12.767474 env[1145]: time="2024-02-12T20:53:12.767412297Z" level=error msg="encountered an error cleaning up failed sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.767609 env[1145]: time="2024-02-12T20:53:12.767514936Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-svvh9,Uid:78477bf0-d44a-434d-bcec-6b3a484f17bd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.767898 kubelet[2102]: E0212 20:53:12.767855 2102 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.768126 kubelet[2102]: E0212 20:53:12.767926 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-svvh9" Feb 12 20:53:12.768126 kubelet[2102]: E0212 20:53:12.767964 2102 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-svvh9" Feb 12 20:53:12.770575 kubelet[2102]: E0212 20:53:12.770542 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-svvh9_kube-system(78477bf0-d44a-434d-bcec-6b3a484f17bd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-svvh9_kube-system(78477bf0-d44a-434d-bcec-6b3a484f17bd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-svvh9" podUID=78477bf0-d44a-434d-bcec-6b3a484f17bd Feb 12 20:53:12.789695 env[1145]: time="2024-02-12T20:53:12.789604358Z" level=error msg="Failed to destroy network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.793066 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d-shm.mount: Deactivated successfully. Feb 12 20:53:12.794947 env[1145]: time="2024-02-12T20:53:12.794873635Z" level=error msg="encountered an error cleaning up failed sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.795101 env[1145]: time="2024-02-12T20:53:12.794975336Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656d5c54f4-njlfx,Uid:4c3a7e78-0095-45b8-b59e-db5a730f12ba,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.795294 kubelet[2102]: E0212 20:53:12.795264 2102 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.795777 kubelet[2102]: E0212 20:53:12.795338 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" Feb 12 20:53:12.795777 kubelet[2102]: E0212 20:53:12.795376 2102 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" Feb 12 20:53:12.795777 kubelet[2102]: E0212 20:53:12.795455 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-656d5c54f4-njlfx_calico-system(4c3a7e78-0095-45b8-b59e-db5a730f12ba)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-656d5c54f4-njlfx_calico-system(4c3a7e78-0095-45b8-b59e-db5a730f12ba)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" podUID=4c3a7e78-0095-45b8-b59e-db5a730f12ba Feb 12 20:53:12.799911 env[1145]: time="2024-02-12T20:53:12.799846115Z" level=error msg="Failed to destroy network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.804402 env[1145]: time="2024-02-12T20:53:12.803810684Z" level=error msg="encountered an error cleaning up failed sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.804402 env[1145]: time="2024-02-12T20:53:12.803892943Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kd6xq,Uid:1c9bbdfa-5067-4e56-ab91-7515695ee5f0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.804586 kubelet[2102]: E0212 20:53:12.804229 2102 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:12.804586 kubelet[2102]: E0212 20:53:12.804314 2102 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-kd6xq" Feb 12 20:53:12.804586 kubelet[2102]: E0212 20:53:12.804350 2102 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-kd6xq" Feb 12 20:53:12.803199 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21-shm.mount: Deactivated successfully. Feb 12 20:53:12.804893 kubelet[2102]: E0212 20:53:12.804434 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-kd6xq_kube-system(1c9bbdfa-5067-4e56-ab91-7515695ee5f0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-kd6xq_kube-system(1c9bbdfa-5067-4e56-ab91-7515695ee5f0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-kd6xq" podUID=1c9bbdfa-5067-4e56-ab91-7515695ee5f0 Feb 12 20:53:13.462932 kubelet[2102]: I0212 20:53:13.462054 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:13.463318 env[1145]: time="2024-02-12T20:53:13.463167772Z" level=info msg="StopPodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\"" Feb 12 20:53:13.467305 kubelet[2102]: I0212 20:53:13.467227 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:13.468721 env[1145]: time="2024-02-12T20:53:13.468665203Z" level=info msg="StopPodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\"" Feb 12 20:53:13.473135 kubelet[2102]: I0212 20:53:13.473091 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:13.474952 env[1145]: time="2024-02-12T20:53:13.474916697Z" level=info msg="StopPodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\"" Feb 12 20:53:13.476737 kubelet[2102]: I0212 20:53:13.476711 2102 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:13.478809 env[1145]: time="2024-02-12T20:53:13.477402892Z" level=info msg="StopPodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\"" Feb 12 20:53:13.484769 env[1145]: time="2024-02-12T20:53:13.483286909Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:53:13.598161 env[1145]: time="2024-02-12T20:53:13.598068211Z" level=error msg="StopPodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" failed" error="failed to destroy network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:13.599180 kubelet[2102]: E0212 20:53:13.598575 2102 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:13.599180 kubelet[2102]: E0212 20:53:13.598656 2102 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127} Feb 12 20:53:13.599180 kubelet[2102]: E0212 20:53:13.598716 2102 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"88583db7-8063-476f-967e-ffbf294ccd01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:53:13.599180 kubelet[2102]: E0212 20:53:13.598762 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"88583db7-8063-476f-967e-ffbf294ccd01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qlf55" podUID=88583db7-8063-476f-967e-ffbf294ccd01 Feb 12 20:53:13.607188 env[1145]: time="2024-02-12T20:53:13.607106862Z" level=error msg="StopPodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" failed" error="failed to destroy network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:13.607852 kubelet[2102]: E0212 20:53:13.607615 2102 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:13.607852 kubelet[2102]: E0212 20:53:13.607688 2102 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d} Feb 12 20:53:13.607852 kubelet[2102]: E0212 20:53:13.607763 2102 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c3a7e78-0095-45b8-b59e-db5a730f12ba\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:53:13.607852 kubelet[2102]: E0212 20:53:13.607828 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c3a7e78-0095-45b8-b59e-db5a730f12ba\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" podUID=4c3a7e78-0095-45b8-b59e-db5a730f12ba Feb 12 20:53:13.611015 env[1145]: time="2024-02-12T20:53:13.610953783Z" level=error msg="StopPodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" failed" error="failed to destroy network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:13.611545 kubelet[2102]: E0212 20:53:13.611344 2102 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:13.611545 kubelet[2102]: E0212 20:53:13.611381 2102 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21} Feb 12 20:53:13.611545 kubelet[2102]: E0212 20:53:13.611449 2102 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c9bbdfa-5067-4e56-ab91-7515695ee5f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:53:13.611545 kubelet[2102]: E0212 20:53:13.611522 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c9bbdfa-5067-4e56-ab91-7515695ee5f0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-kd6xq" podUID=1c9bbdfa-5067-4e56-ab91-7515695ee5f0 Feb 12 20:53:13.613771 env[1145]: time="2024-02-12T20:53:13.613704134Z" level=error msg="StopPodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" failed" error="failed to destroy network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:53:13.613995 kubelet[2102]: E0212 20:53:13.613951 2102 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:13.614104 kubelet[2102]: E0212 20:53:13.614006 2102 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f} Feb 12 20:53:13.614104 kubelet[2102]: E0212 20:53:13.614055 2102 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"78477bf0-d44a-434d-bcec-6b3a484f17bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:53:13.614285 kubelet[2102]: E0212 20:53:13.614115 2102 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"78477bf0-d44a-434d-bcec-6b3a484f17bd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-svvh9" podUID=78477bf0-d44a-434d-bcec-6b3a484f17bd Feb 12 20:53:20.187692 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4005365726.mount: Deactivated successfully. Feb 12 20:53:20.250008 env[1145]: time="2024-02-12T20:53:20.249938778Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:20.252716 env[1145]: time="2024-02-12T20:53:20.252660652Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:20.255079 env[1145]: time="2024-02-12T20:53:20.255038827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:20.257216 env[1145]: time="2024-02-12T20:53:20.257173411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:20.257978 env[1145]: time="2024-02-12T20:53:20.257934757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:53:20.282535 env[1145]: time="2024-02-12T20:53:20.279381576Z" level=info msg="CreateContainer within sandbox \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:53:20.301470 env[1145]: time="2024-02-12T20:53:20.301407229Z" level=info msg="CreateContainer within sandbox \"30a4ae0aa206dc2d3a167483c729a429372fd1308e2a8cb679eafe58380f358c\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3\"" Feb 12 20:53:20.302371 env[1145]: time="2024-02-12T20:53:20.302333381Z" level=info msg="StartContainer for \"9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3\"" Feb 12 20:53:20.334529 systemd[1]: Started cri-containerd-9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3.scope. Feb 12 20:53:20.395576 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:53:20.395786 kernel: audit: type=1400 audit(1707771200.367:1133): avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fce115baaa8 items=0 ppid=2640 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:20.429358 kernel: audit: type=1300 audit(1707771200.367:1133): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fce115baaa8 items=0 ppid=2640 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:20.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303064633838326539326633363465363833356234353330383662 Feb 12 20:53:20.459557 kernel: audit: type=1327 audit(1707771200.367:1133): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303064633838326539326633363465363833356234353330383662 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.500896 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.501094 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.545418 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.545587 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.567092 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.574629 env[1145]: time="2024-02-12T20:53:20.574567115Z" level=info msg="StartContainer for \"9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3\" returns successfully" Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.604276 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.627301 kernel: audit: type=1400 audit(1707771200.367:1134): avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.367000 audit: BPF prog-id=148 op=LOAD Feb 12 20:53:20.367000 audit[3165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7b98 items=0 ppid=2640 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:20.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303064633838326539326633363465363833356234353330383662 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit: BPF prog-id=149 op=LOAD Feb 12 20:53:20.428000 audit[3165]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7be8 items=0 ppid=2640 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:20.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303064633838326539326633363465363833356234353330383662 Feb 12 20:53:20.428000 audit: BPF prog-id=149 op=UNLOAD Feb 12 20:53:20.428000 audit: BPF prog-id=148 op=UNLOAD Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { perfmon } for pid=3165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit[3165]: AVC avc: denied { bpf } for pid=3165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:20.428000 audit: BPF prog-id=150 op=LOAD Feb 12 20:53:20.428000 audit[3165]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c78 items=0 ppid=2640 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:20.428000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937303064633838326539326633363465363833356234353330383662 Feb 12 20:53:20.722831 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:53:20.723017 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:53:21.560711 kubelet[2102]: I0212 20:53:21.560043 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-g2hng" podStartSLOduration=-9.223372013294788e+09 pod.CreationTimestamp="2024-02-12 20:52:58 +0000 UTC" firstStartedPulling="2024-02-12 20:52:58.848705559 +0000 UTC m=+18.910977141" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:53:21.556405417 +0000 UTC m=+41.618677032" watchObservedRunningTime="2024-02-12 20:53:21.559987664 +0000 UTC m=+41.622259267" Feb 12 20:53:22.217000 audit[3279]: AVC avc: denied { write } for pid=3279 comm="tee" name="fd" dev="proc" ino=24811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.218000 audit[3270]: AVC avc: denied { write } for pid=3270 comm="tee" name="fd" dev="proc" ino=24814 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.217000 audit[3279]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1fa9692d a2=241 a3=1b6 items=1 ppid=3232 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.217000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:53:22.217000 audit: PATH item=0 name="/dev/fd/63" inode=24801 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.217000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:22.218000 audit[3270]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffac4f992f a2=241 a3=1b6 items=1 ppid=3234 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.241000 audit[3277]: AVC avc: denied { write } for pid=3277 comm="tee" name="fd" dev="proc" ino=24395 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.241000 audit[3277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb417d91d a2=241 a3=1b6 items=1 ppid=3239 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.241000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:53:22.241000 audit: PATH item=0 name="/dev/fd/63" inode=24379 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.241000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:22.243000 audit[3293]: AVC avc: denied { write } for pid=3293 comm="tee" name="fd" dev="proc" ino=24401 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.243000 audit[3293]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd30d6e91e a2=241 a3=1b6 items=1 ppid=3237 pid=3293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.243000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:53:22.243000 audit: PATH item=0 name="/dev/fd/63" inode=24805 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:22.246000 audit[3296]: AVC avc: denied { write } for pid=3296 comm="tee" name="fd" dev="proc" ino=24405 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.246000 audit[3296]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdfb4ed92d a2=241 a3=1b6 items=1 ppid=3231 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.246000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:53:22.246000 audit: PATH item=0 name="/dev/fd/63" inode=24806 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.246000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:22.218000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:53:22.218000 audit: PATH item=0 name="/dev/fd/63" inode=24792 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.218000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:22.217000 audit[3284]: AVC avc: denied { write } for pid=3284 comm="tee" name="fd" dev="proc" ino=24408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.217000 audit[3284]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd01cf292d a2=241 a3=1b6 items=1 ppid=3229 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.217000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:53:22.217000 audit: PATH item=0 name="/dev/fd/63" inode=24384 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.217000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:22.272000 audit[3305]: AVC avc: denied { write } for pid=3305 comm="tee" name="fd" dev="proc" ino=24825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:53:22.272000 audit[3305]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf5a5e92e a2=241 a3=1b6 items=1 ppid=3247 pid=3305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:22.272000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:53:22.272000 audit: PATH item=0 name="/dev/fd/63" inode=24407 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:53:22.272000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:53:24.864957 kubelet[2102]: I0212 20:53:24.864897 2102 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:53:24.892334 systemd[1]: run-containerd-runc-k8s.io-9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3-runc.ZFEupn.mount: Deactivated successfully. Feb 12 20:53:24.980604 systemd[1]: run-containerd-runc-k8s.io-9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3-runc.jfq8Km.mount: Deactivated successfully. Feb 12 20:53:26.358355 env[1145]: time="2024-02-12T20:53:26.358306326Z" level=info msg="StopPodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\"" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.421 [INFO][3432] k8s.go 578: Cleaning up netns ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.422 [INFO][3432] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" iface="eth0" netns="/var/run/netns/cni-5009724a-9f33-763a-fda3-1e5d3c2ad7ee" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.422 [INFO][3432] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" iface="eth0" netns="/var/run/netns/cni-5009724a-9f33-763a-fda3-1e5d3c2ad7ee" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.422 [INFO][3432] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" iface="eth0" netns="/var/run/netns/cni-5009724a-9f33-763a-fda3-1e5d3c2ad7ee" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.423 [INFO][3432] k8s.go 585: Releasing IP address(es) ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.423 [INFO][3432] utils.go 188: Calico CNI releasing IP address ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.449 [INFO][3438] ipam_plugin.go 415: Releasing address using handleID ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.449 [INFO][3438] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.449 [INFO][3438] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.459 [WARNING][3438] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.459 [INFO][3438] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.461 [INFO][3438] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:26.464694 env[1145]: 2024-02-12 20:53:26.463 [INFO][3432] k8s.go 591: Teardown processing complete. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:26.469308 systemd[1]: run-netns-cni\x2d5009724a\x2d9f33\x2d763a\x2dfda3\x2d1e5d3c2ad7ee.mount: Deactivated successfully. Feb 12 20:53:26.470779 env[1145]: time="2024-02-12T20:53:26.470721079Z" level=info msg="TearDown network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" successfully" Feb 12 20:53:26.470962 env[1145]: time="2024-02-12T20:53:26.470912417Z" level=info msg="StopPodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" returns successfully" Feb 12 20:53:26.471952 env[1145]: time="2024-02-12T20:53:26.471908852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qlf55,Uid:88583db7-8063-476f-967e-ffbf294ccd01,Namespace:calico-system,Attempt:1,}" Feb 12 20:53:26.653765 systemd-networkd[1024]: cali14b0d4f1764: Link UP Feb 12 20:53:26.662202 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:53:26.673552 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali14b0d4f1764: link becomes ready Feb 12 20:53:26.673238 systemd-networkd[1024]: cali14b0d4f1764: Gained carrier Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.525 [INFO][3445] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.538 [INFO][3445] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0 csi-node-driver- calico-system 88583db7-8063-476f-967e-ffbf294ccd01 680 0 2024-02-12 20:52:58 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal csi-node-driver-qlf55 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali14b0d4f1764 [] []}} ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.538 [INFO][3445] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.578 [INFO][3456] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" HandleID="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.590 [INFO][3456] ipam_plugin.go 268: Auto assigning IP ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" HandleID="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cdc0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", "pod":"csi-node-driver-qlf55", "timestamp":"2024-02-12 20:53:26.578888154 +0000 UTC"}, Hostname:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.591 [INFO][3456] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.591 [INFO][3456] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.591 [INFO][3456] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal' Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.594 [INFO][3456] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.599 [INFO][3456] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.606 [INFO][3456] ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.608 [INFO][3456] ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.612 [INFO][3456] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.614 [INFO][3456] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.617 [INFO][3456] ipam.go 1682: Creating new handle: k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.623 [INFO][3456] ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.631 [INFO][3456] ipam.go 1216: Successfully claimed IPs: [192.168.20.1/26] block=192.168.20.0/26 handle="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.631 [INFO][3456] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.1/26] handle="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.631 [INFO][3456] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:26.690817 env[1145]: 2024-02-12 20:53:26.631 [INFO][3456] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.20.1/26] IPv6=[] ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" HandleID="k8s-pod-network.abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.692262 env[1145]: 2024-02-12 20:53:26.635 [INFO][3445] k8s.go 385: Populated endpoint ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88583db7-8063-476f-967e-ffbf294ccd01", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-qlf55", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14b0d4f1764", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:26.692262 env[1145]: 2024-02-12 20:53:26.635 [INFO][3445] k8s.go 386: Calico CNI using IPs: [192.168.20.1/32] ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.692262 env[1145]: 2024-02-12 20:53:26.635 [INFO][3445] dataplane_linux.go 68: Setting the host side veth name to cali14b0d4f1764 ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.692262 env[1145]: 2024-02-12 20:53:26.672 [INFO][3445] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.692262 env[1145]: 2024-02-12 20:53:26.674 [INFO][3445] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88583db7-8063-476f-967e-ffbf294ccd01", ResourceVersion:"680", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe", Pod:"csi-node-driver-qlf55", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14b0d4f1764", MAC:"2a:98:e9:29:85:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:26.692262 env[1145]: 2024-02-12 20:53:26.687 [INFO][3445] k8s.go 491: Wrote updated endpoint to datastore ContainerID="abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe" Namespace="calico-system" Pod="csi-node-driver-qlf55" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:26.714820 env[1145]: time="2024-02-12T20:53:26.714727464Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:53:26.715019 env[1145]: time="2024-02-12T20:53:26.714839333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:53:26.715019 env[1145]: time="2024-02-12T20:53:26.714882058Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:53:26.715171 env[1145]: time="2024-02-12T20:53:26.715097049Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe pid=3491 runtime=io.containerd.runc.v2 Feb 12 20:53:26.757293 systemd[1]: Started cri-containerd-abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe.scope. Feb 12 20:53:26.816428 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 20:53:26.816626 kernel: audit: type=1400 audit(1707771206.789:1146): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.848246 kernel: audit: type=1400 audit(1707771206.789:1147): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.864534 env[1145]: time="2024-02-12T20:53:26.864479620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qlf55,Uid:88583db7-8063-476f-967e-ffbf294ccd01,Namespace:calico-system,Attempt:1,} returns sandbox id \"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe\"" Feb 12 20:53:26.867496 env[1145]: time="2024-02-12T20:53:26.867446050Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.912834 kernel: audit: type=1400 audit(1707771206.789:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.912996 kernel: audit: type=1400 audit(1707771206.789:1149): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.915056 kernel: audit: type=1400 audit(1707771206.789:1150): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.978786 kernel: audit: type=1400 audit(1707771206.789:1151): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.978945 kernel: audit: type=1400 audit(1707771206.789:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.979002 kernel: audit: type=1400 audit(1707771206.789:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:27.020460 kernel: audit: type=1400 audit(1707771206.789:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:27.020601 kernel: audit: type=1400 audit(1707771206.815:1155): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.815000 audit: BPF prog-id=151 op=LOAD Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3491 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:26.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653836303166663866646335633464366439656639376333386336 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3491 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:26.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653836303166663866646335633464366439656639376333386336 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit: BPF prog-id=152 op=LOAD Feb 12 20:53:26.816000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000292360 items=0 ppid=3491 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:26.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653836303166663866646335633464366439656639376333386336 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.816000 audit: BPF prog-id=153 op=LOAD Feb 12 20:53:26.816000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002923a8 items=0 ppid=3491 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:26.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653836303166663866646335633464366439656639376333386336 Feb 12 20:53:26.816000 audit: BPF prog-id=153 op=UNLOAD Feb 12 20:53:26.816000 audit: BPF prog-id=152 op=UNLOAD Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:26.817000 audit: BPF prog-id=154 op=LOAD Feb 12 20:53:26.817000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002927b8 items=0 ppid=3491 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:26.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653836303166663866646335633464366439656639376333386336 Feb 12 20:53:27.356132 env[1145]: time="2024-02-12T20:53:27.356079904Z" level=info msg="StopPodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\"" Feb 12 20:53:27.356749 env[1145]: time="2024-02-12T20:53:27.356615455Z" level=info msg="StopPodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\"" Feb 12 20:53:27.473690 kubelet[2102]: I0212 20:53:27.470999 2102 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.441 [INFO][3563] k8s.go 578: Cleaning up netns ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.441 [INFO][3563] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" iface="eth0" netns="/var/run/netns/cni-fee01fb9-9403-7ca9-0409-c9bcd323ba5a" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.442 [INFO][3563] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" iface="eth0" netns="/var/run/netns/cni-fee01fb9-9403-7ca9-0409-c9bcd323ba5a" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.443 [INFO][3563] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" iface="eth0" netns="/var/run/netns/cni-fee01fb9-9403-7ca9-0409-c9bcd323ba5a" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.443 [INFO][3563] k8s.go 585: Releasing IP address(es) ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.443 [INFO][3563] utils.go 188: Calico CNI releasing IP address ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.536 [INFO][3580] ipam_plugin.go 415: Releasing address using handleID ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.536 [INFO][3580] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.536 [INFO][3580] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.548 [WARNING][3580] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.548 [INFO][3580] ipam_plugin.go 443: Releasing address using workloadID ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.549 [INFO][3580] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:27.556278 env[1145]: 2024-02-12 20:53:27.551 [INFO][3563] k8s.go 591: Teardown processing complete. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:27.563967 systemd[1]: run-netns-cni\x2dfee01fb9\x2d9403\x2d7ca9\x2d0409\x2dc9bcd323ba5a.mount: Deactivated successfully. Feb 12 20:53:27.566811 env[1145]: time="2024-02-12T20:53:27.566750908Z" level=info msg="TearDown network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" successfully" Feb 12 20:53:27.566811 env[1145]: time="2024-02-12T20:53:27.566799361Z" level=info msg="StopPodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" returns successfully" Feb 12 20:53:27.568097 env[1145]: time="2024-02-12T20:53:27.568051089Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-svvh9,Uid:78477bf0-d44a-434d-bcec-6b3a484f17bd,Namespace:kube-system,Attempt:1,}" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.459 [INFO][3571] k8s.go 578: Cleaning up netns ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.459 [INFO][3571] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" iface="eth0" netns="/var/run/netns/cni-8d14d99a-59fd-f608-5560-b0652d9ac992" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.460 [INFO][3571] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" iface="eth0" netns="/var/run/netns/cni-8d14d99a-59fd-f608-5560-b0652d9ac992" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.460 [INFO][3571] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" iface="eth0" netns="/var/run/netns/cni-8d14d99a-59fd-f608-5560-b0652d9ac992" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.460 [INFO][3571] k8s.go 585: Releasing IP address(es) ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.460 [INFO][3571] utils.go 188: Calico CNI releasing IP address ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.535 [INFO][3584] ipam_plugin.go 415: Releasing address using handleID ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.539 [INFO][3584] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.549 [INFO][3584] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.574 [WARNING][3584] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.574 [INFO][3584] ipam_plugin.go 443: Releasing address using workloadID ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.577 [INFO][3584] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:27.579842 env[1145]: 2024-02-12 20:53:27.578 [INFO][3571] k8s.go 591: Teardown processing complete. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:27.580817 env[1145]: time="2024-02-12T20:53:27.580779046Z" level=info msg="TearDown network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" successfully" Feb 12 20:53:27.580979 env[1145]: time="2024-02-12T20:53:27.580949258Z" level=info msg="StopPodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" returns successfully" Feb 12 20:53:27.581695 env[1145]: time="2024-02-12T20:53:27.581657753Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656d5c54f4-njlfx,Uid:4c3a7e78-0095-45b8-b59e-db5a730f12ba,Namespace:calico-system,Attempt:1,}" Feb 12 20:53:27.588772 systemd[1]: run-netns-cni\x2d8d14d99a\x2d59fd\x2df608\x2d5560\x2db0652d9ac992.mount: Deactivated successfully. Feb 12 20:53:27.671000 audit[3623]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=3623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:27.671000 audit[3623]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7fff86934660 a2=0 a3=7fff8693464c items=0 ppid=2313 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:27.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:27.672000 audit[3623]: NETFILTER_CFG table=nat:110 family=2 entries=27 op=nft_register_chain pid=3623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:27.672000 audit[3623]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7fff86934660 a2=0 a3=7fff8693464c items=0 ppid=2313 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:27.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:27.933751 systemd-networkd[1024]: cali14b0d4f1764: Gained IPv6LL Feb 12 20:53:27.979254 systemd-networkd[1024]: calibed370de67b: Link UP Feb 12 20:53:27.987260 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:53:27.997188 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibed370de67b: link becomes ready Feb 12 20:53:28.003444 systemd-networkd[1024]: calibed370de67b: Gained carrier Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.715 [INFO][3617] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.738 [INFO][3617] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0 coredns-787d4945fb- kube-system 78477bf0-d44a-434d-bcec-6b3a484f17bd 689 0 2024-02-12 20:52:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal coredns-787d4945fb-svvh9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibed370de67b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.739 [INFO][3617] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.858 [INFO][3650] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" HandleID="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.888 [INFO][3650] ipam_plugin.go 268: Auto assigning IP ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" HandleID="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027c840), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", "pod":"coredns-787d4945fb-svvh9", "timestamp":"2024-02-12 20:53:27.858570352 +0000 UTC"}, Hostname:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.888 [INFO][3650] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.888 [INFO][3650] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.888 [INFO][3650] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal' Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.890 [INFO][3650] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.901 [INFO][3650] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.911 [INFO][3650] ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.917 [INFO][3650] ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.924 [INFO][3650] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.924 [INFO][3650] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.929 [INFO][3650] ipam.go 1682: Creating new handle: k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875 Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.948 [INFO][3650] ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.973 [INFO][3650] ipam.go 1216: Successfully claimed IPs: [192.168.20.2/26] block=192.168.20.0/26 handle="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.973 [INFO][3650] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.2/26] handle="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.973 [INFO][3650] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:28.054959 env[1145]: 2024-02-12 20:53:27.973 [INFO][3650] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.20.2/26] IPv6=[] ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" HandleID="k8s-pod-network.ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.056433 env[1145]: 2024-02-12 20:53:27.975 [INFO][3617] k8s.go 385: Populated endpoint ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"78477bf0-d44a-434d-bcec-6b3a484f17bd", ResourceVersion:"689", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-787d4945fb-svvh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibed370de67b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:28.056433 env[1145]: 2024-02-12 20:53:27.975 [INFO][3617] k8s.go 386: Calico CNI using IPs: [192.168.20.2/32] ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.056433 env[1145]: 2024-02-12 20:53:27.975 [INFO][3617] dataplane_linux.go 68: Setting the host side veth name to calibed370de67b ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.056433 env[1145]: 2024-02-12 20:53:28.004 [INFO][3617] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.056433 env[1145]: 2024-02-12 20:53:28.005 [INFO][3617] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"78477bf0-d44a-434d-bcec-6b3a484f17bd", ResourceVersion:"689", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875", Pod:"coredns-787d4945fb-svvh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibed370de67b", MAC:"46:8e:20:09:29:48", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:28.056433 env[1145]: 2024-02-12 20:53:28.049 [INFO][3617] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875" Namespace="kube-system" Pod="coredns-787d4945fb-svvh9" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:28.064270 systemd-networkd[1024]: cali300df014147: Link UP Feb 12 20:53:28.075260 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali300df014147: link becomes ready Feb 12 20:53:28.076400 systemd-networkd[1024]: cali300df014147: Gained carrier Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.734 [INFO][3628] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.775 [INFO][3628] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0 calico-kube-controllers-656d5c54f4- calico-system 4c3a7e78-0095-45b8-b59e-db5a730f12ba 690 0 2024-02-12 20:52:58 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:656d5c54f4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal calico-kube-controllers-656d5c54f4-njlfx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali300df014147 [] []}} ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.775 [INFO][3628] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.933 [INFO][3655] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" HandleID="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.986 [INFO][3655] ipam_plugin.go 268: Auto assigning IP ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" HandleID="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291410), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", "pod":"calico-kube-controllers-656d5c54f4-njlfx", "timestamp":"2024-02-12 20:53:27.933079508 +0000 UTC"}, Hostname:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.986 [INFO][3655] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.987 [INFO][3655] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:27.987 [INFO][3655] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal' Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.000 [INFO][3655] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.014 [INFO][3655] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.022 [INFO][3655] ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.024 [INFO][3655] ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.028 [INFO][3655] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.029 [INFO][3655] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.032 [INFO][3655] ipam.go 1682: Creating new handle: k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306 Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.037 [INFO][3655] ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.050 [INFO][3655] ipam.go 1216: Successfully claimed IPs: [192.168.20.3/26] block=192.168.20.0/26 handle="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.050 [INFO][3655] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.3/26] handle="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.050 [INFO][3655] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:28.117108 env[1145]: 2024-02-12 20:53:28.051 [INFO][3655] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.20.3/26] IPv6=[] ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" HandleID="k8s-pod-network.aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.118469 env[1145]: 2024-02-12 20:53:28.055 [INFO][3628] k8s.go 385: Populated endpoint ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0", GenerateName:"calico-kube-controllers-656d5c54f4-", Namespace:"calico-system", SelfLink:"", UID:"4c3a7e78-0095-45b8-b59e-db5a730f12ba", ResourceVersion:"690", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656d5c54f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-656d5c54f4-njlfx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali300df014147", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:28.118469 env[1145]: 2024-02-12 20:53:28.056 [INFO][3628] k8s.go 386: Calico CNI using IPs: [192.168.20.3/32] ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.118469 env[1145]: 2024-02-12 20:53:28.056 [INFO][3628] dataplane_linux.go 68: Setting the host side veth name to cali300df014147 ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.118469 env[1145]: 2024-02-12 20:53:28.085 [INFO][3628] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.118469 env[1145]: 2024-02-12 20:53:28.085 [INFO][3628] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0", GenerateName:"calico-kube-controllers-656d5c54f4-", Namespace:"calico-system", SelfLink:"", UID:"4c3a7e78-0095-45b8-b59e-db5a730f12ba", ResourceVersion:"690", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656d5c54f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306", Pod:"calico-kube-controllers-656d5c54f4-njlfx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali300df014147", MAC:"a2:41:2b:15:fe:a1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:28.118469 env[1145]: 2024-02-12 20:53:28.103 [INFO][3628] k8s.go 491: Wrote updated endpoint to datastore ContainerID="aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306" Namespace="calico-system" Pod="calico-kube-controllers-656d5c54f4-njlfx" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:28.165993 env[1145]: time="2024-02-12T20:53:28.163441679Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:53:28.165993 env[1145]: time="2024-02-12T20:53:28.163515810Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:53:28.165993 env[1145]: time="2024-02-12T20:53:28.163534833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:53:28.193200 env[1145]: time="2024-02-12T20:53:28.187101014Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875 pid=3706 runtime=io.containerd.runc.v2 Feb 12 20:53:28.232364 systemd[1]: Started cri-containerd-ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875.scope. Feb 12 20:53:28.252034 env[1145]: time="2024-02-12T20:53:28.251916840Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:53:28.252267 env[1145]: time="2024-02-12T20:53:28.252048691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:53:28.252377 env[1145]: time="2024-02-12T20:53:28.252310970Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:53:28.261100 env[1145]: time="2024-02-12T20:53:28.252900988Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306 pid=3725 runtime=io.containerd.runc.v2 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.269000 audit: BPF prog-id=155 op=LOAD Feb 12 20:53:28.271000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.271000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3706 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336564636133623765333063633331666363663233386633623139 Feb 12 20:53:28.271000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.271000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3706 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336564636133623765333063633331666363663233386633623139 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.272000 audit: BPF prog-id=156 op=LOAD Feb 12 20:53:28.272000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000211040 items=0 ppid=3706 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336564636133623765333063633331666363663233386633623139 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.274000 audit: BPF prog-id=157 op=LOAD Feb 12 20:53:28.274000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000211088 items=0 ppid=3706 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336564636133623765333063633331666363663233386633623139 Feb 12 20:53:28.275000 audit: BPF prog-id=157 op=UNLOAD Feb 12 20:53:28.275000 audit: BPF prog-id=156 op=UNLOAD Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { perfmon } for pid=3727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit[3727]: AVC avc: denied { bpf } for pid=3727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.275000 audit: BPF prog-id=158 op=LOAD Feb 12 20:53:28.275000 audit[3727]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000211498 items=0 ppid=3706 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.275000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336564636133623765333063633331666363663233386633623139 Feb 12 20:53:28.359421 systemd[1]: Started cri-containerd-aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306.scope. Feb 12 20:53:28.370085 env[1145]: time="2024-02-12T20:53:28.370030954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-svvh9,Uid:78477bf0-d44a-434d-bcec-6b3a484f17bd,Namespace:kube-system,Attempt:1,} returns sandbox id \"ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875\"" Feb 12 20:53:28.375725 env[1145]: time="2024-02-12T20:53:28.375666557Z" level=info msg="CreateContainer within sandbox \"ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:53:28.413650 env[1145]: time="2024-02-12T20:53:28.413583028Z" level=info msg="CreateContainer within sandbox \"ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"70060f105e978ca89b7a41243fef54e04f9e358c3b79f34ffc4965fa65d47f58\"" Feb 12 20:53:28.414498 env[1145]: time="2024-02-12T20:53:28.414451298Z" level=info msg="StartContainer for \"70060f105e978ca89b7a41243fef54e04f9e358c3b79f34ffc4965fa65d47f58\"" Feb 12 20:53:28.467827 systemd[1]: Started cri-containerd-70060f105e978ca89b7a41243fef54e04f9e358c3b79f34ffc4965fa65d47f58.scope. Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.501000 audit: BPF prog-id=159 op=LOAD Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3725 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165633366313865333738326466353966643931636263636132343931 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=3725 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165633366313865333738326466353966643931636263636132343931 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit: BPF prog-id=160 op=LOAD Feb 12 20:53:28.503000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c00028dc20 items=0 ppid=3725 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165633366313865333738326466353966643931636263636132343931 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit: BPF prog-id=161 op=LOAD Feb 12 20:53:28.503000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c00028dc68 items=0 ppid=3725 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165633366313865333738326466353966643931636263636132343931 Feb 12 20:53:28.503000 audit: BPF prog-id=161 op=UNLOAD Feb 12 20:53:28.503000 audit: BPF prog-id=160 op=UNLOAD Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { perfmon } for pid=3754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit[3754]: AVC avc: denied { bpf } for pid=3754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.503000 audit: BPF prog-id=162 op=LOAD Feb 12 20:53:28.503000 audit[3754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000414078 items=0 ppid=3725 pid=3754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165633366313865333738326466353966643931636263636132343931 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit: BPF prog-id=163 op=LOAD Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3706 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303630663130356539373863613839623761343132343366656635 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3706 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303630663130356539373863613839623761343132343366656635 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.515000 audit: BPF prog-id=164 op=LOAD Feb 12 20:53:28.515000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020bba0 items=0 ppid=3706 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303630663130356539373863613839623761343132343366656635 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit: BPF prog-id=165 op=LOAD Feb 12 20:53:28.516000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020bbe8 items=0 ppid=3706 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303630663130356539373863613839623761343132343366656635 Feb 12 20:53:28.516000 audit: BPF prog-id=165 op=UNLOAD Feb 12 20:53:28.516000 audit: BPF prog-id=164 op=UNLOAD Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { perfmon } for pid=3789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit[3789]: AVC avc: denied { bpf } for pid=3789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:28.516000 audit: BPF prog-id=166 op=LOAD Feb 12 20:53:28.516000 audit[3789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020bff8 items=0 ppid=3706 pid=3789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:28.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730303630663130356539373863613839623761343132343366656635 Feb 12 20:53:28.544717 env[1145]: time="2024-02-12T20:53:28.544660673Z" level=info msg="StartContainer for \"70060f105e978ca89b7a41243fef54e04f9e358c3b79f34ffc4965fa65d47f58\" returns successfully" Feb 12 20:53:28.628572 kubelet[2102]: I0212 20:53:28.628529 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-svvh9" podStartSLOduration=36.628421091 pod.CreationTimestamp="2024-02-12 20:52:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:53:28.627306235 +0000 UTC m=+48.689577838" watchObservedRunningTime="2024-02-12 20:53:28.628421091 +0000 UTC m=+48.690692694" Feb 12 20:53:28.791693 env[1145]: time="2024-02-12T20:53:28.786202362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656d5c54f4-njlfx,Uid:4c3a7e78-0095-45b8-b59e-db5a730f12ba,Namespace:calico-system,Attempt:1,} returns sandbox id \"aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306\"" Feb 12 20:53:29.079036 env[1145]: time="2024-02-12T20:53:29.078902840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:29.084987 env[1145]: time="2024-02-12T20:53:29.084934561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:29.087000 audit[3883]: NETFILTER_CFG table=filter:111 family=2 entries=12 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:29.087000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=4028 a0=3 a1=7ffedd0b2910 a2=0 a3=7ffedd0b28fc items=0 ppid=2313 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.087000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:29.091500 env[1145]: time="2024-02-12T20:53:29.091457243Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:29.089000 audit[3883]: NETFILTER_CFG table=nat:112 family=2 entries=30 op=nft_register_rule pid=3883 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:29.089000 audit[3883]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffedd0b2910 a2=0 a3=7ffedd0b28fc items=0 ppid=2313 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:29.093793 env[1145]: time="2024-02-12T20:53:29.093736344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:29.094913 env[1145]: time="2024-02-12T20:53:29.094870824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:53:29.097322 env[1145]: time="2024-02-12T20:53:29.097288829Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 20:53:29.099115 env[1145]: time="2024-02-12T20:53:29.099079936Z" level=info msg="CreateContainer within sandbox \"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:53:29.127198 env[1145]: time="2024-02-12T20:53:29.127125684Z" level=info msg="CreateContainer within sandbox \"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"915d5d24fb9b3ac734d422fca0c801093f8e27c2c23d35f4665efee4172d6008\"" Feb 12 20:53:29.128326 env[1145]: time="2024-02-12T20:53:29.128285445Z" level=info msg="StartContainer for \"915d5d24fb9b3ac734d422fca0c801093f8e27c2c23d35f4665efee4172d6008\"" Feb 12 20:53:29.170825 systemd[1]: Started cri-containerd-915d5d24fb9b3ac734d422fca0c801093f8e27c2c23d35f4665efee4172d6008.scope. Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fa6437c0cb8 items=0 ppid=3491 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356435643234666239623361633733346434323266636130633830 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit: BPF prog-id=167 op=LOAD Feb 12 20:53:29.268000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000394088 items=0 ppid=3491 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356435643234666239623361633733346434323266636130633830 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit: BPF prog-id=168 op=LOAD Feb 12 20:53:29.268000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003940d8 items=0 ppid=3491 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356435643234666239623361633733346434323266636130633830 Feb 12 20:53:29.268000 audit: BPF prog-id=168 op=UNLOAD Feb 12 20:53:29.268000 audit: BPF prog-id=167 op=UNLOAD Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.268000 audit: BPF prog-id=169 op=LOAD Feb 12 20:53:29.268000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000394168 items=0 ppid=3491 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356435643234666239623361633733346434323266636130633830 Feb 12 20:53:29.298743 env[1145]: time="2024-02-12T20:53:29.298686097Z" level=info msg="StartContainer for \"915d5d24fb9b3ac734d422fca0c801093f8e27c2c23d35f4665efee4172d6008\" returns successfully" Feb 12 20:53:29.361907 env[1145]: time="2024-02-12T20:53:29.361857225Z" level=info msg="StopPodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\"" Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.375000 audit: BPF prog-id=170 op=LOAD Feb 12 20:53:29.375000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9e1fb3c0 a2=70 a3=7f4634838000 items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.375000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.376000 audit: BPF prog-id=170 op=UNLOAD Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit: BPF prog-id=171 op=LOAD Feb 12 20:53:29.376000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9e1fb3c0 a2=70 a3=6e items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.376000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.376000 audit: BPF prog-id=171 op=UNLOAD Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9e1fb370 a2=70 a3=7ffc9e1fb3c0 items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.376000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit: BPF prog-id=172 op=LOAD Feb 12 20:53:29.376000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc9e1fb350 a2=70 a3=7ffc9e1fb3c0 items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.376000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.376000 audit: BPF prog-id=172 op=UNLOAD Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9e1fb430 a2=70 a3=0 items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.376000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9e1fb420 a2=70 a3=0 items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.376000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.376000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.376000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc9e1fb460 a2=70 a3=0 items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.376000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.377000 audit: BPF prog-id=173 op=LOAD Feb 12 20:53:29.377000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc9e1fb380 a2=70 a3=ffffffff items=0 ppid=3639 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.377000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:53:29.395000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.395000 audit[3942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c24cd10 a2=70 a3=fff80800 items=0 ppid=3639 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:53:29.398000 audit[3942]: AVC avc: denied { bpf } for pid=3942 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:29.398000 audit[3942]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c24cbe0 a2=70 a3=3 items=0 ppid=3639 pid=3942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.398000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:53:29.427000 audit: BPF prog-id=173 op=UNLOAD Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.493 [INFO][3952] k8s.go 578: Cleaning up netns ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.493 [INFO][3952] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" iface="eth0" netns="/var/run/netns/cni-f487e416-8498-9d89-c6de-6f26eb7edadd" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.494 [INFO][3952] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" iface="eth0" netns="/var/run/netns/cni-f487e416-8498-9d89-c6de-6f26eb7edadd" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.494 [INFO][3952] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" iface="eth0" netns="/var/run/netns/cni-f487e416-8498-9d89-c6de-6f26eb7edadd" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.494 [INFO][3952] k8s.go 585: Releasing IP address(es) ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.494 [INFO][3952] utils.go 188: Calico CNI releasing IP address ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.548 [INFO][3967] ipam_plugin.go 415: Releasing address using handleID ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.549 [INFO][3967] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.549 [INFO][3967] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.561 [WARNING][3967] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.561 [INFO][3967] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.563 [INFO][3967] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:29.566315 env[1145]: 2024-02-12 20:53:29.564 [INFO][3952] k8s.go 591: Teardown processing complete. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:29.570654 systemd[1]: run-netns-cni\x2df487e416\x2d8498\x2d9d89\x2dc6de\x2d6f26eb7edadd.mount: Deactivated successfully. Feb 12 20:53:29.571905 env[1145]: time="2024-02-12T20:53:29.571704386Z" level=info msg="TearDown network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" successfully" Feb 12 20:53:29.571905 env[1145]: time="2024-02-12T20:53:29.571773042Z" level=info msg="StopPodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" returns successfully" Feb 12 20:53:29.572764 env[1145]: time="2024-02-12T20:53:29.572709554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kd6xq,Uid:1c9bbdfa-5067-4e56-ab91-7515695ee5f0,Namespace:kube-system,Attempt:1,}" Feb 12 20:53:29.600843 systemd-networkd[1024]: cali300df014147: Gained IPv6LL Feb 12 20:53:29.725390 systemd-networkd[1024]: calibed370de67b: Gained IPv6LL Feb 12 20:53:29.863815 systemd-networkd[1024]: cali251b3756673: Link UP Feb 12 20:53:29.874302 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali251b3756673: link becomes ready Feb 12 20:53:29.880175 systemd-networkd[1024]: cali251b3756673: Gained carrier Feb 12 20:53:29.896000 audit[4026]: NETFILTER_CFG table=raw:113 family=2 entries=19 op=nft_register_chain pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:53:29.896000 audit[4026]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fffef7b9a60 a2=0 a3=7fffef7b9a4c items=0 ppid=3639 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.896000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:53:29.898000 audit[4027]: NETFILTER_CFG table=nat:114 family=2 entries=16 op=nft_register_chain pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:53:29.898000 audit[4027]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe5e3401e0 a2=0 a3=55c72106b000 items=0 ppid=3639 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.898000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.681 [INFO][3979] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0 coredns-787d4945fb- kube-system 1c9bbdfa-5067-4e56-ab91-7515695ee5f0 721 0 2024-02-12 20:52:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal coredns-787d4945fb-kd6xq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali251b3756673 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.682 [INFO][3979] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.771 [INFO][3998] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" HandleID="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.793 [INFO][3998] ipam_plugin.go 268: Auto assigning IP ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" HandleID="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024ece0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", "pod":"coredns-787d4945fb-kd6xq", "timestamp":"2024-02-12 20:53:29.771561375 +0000 UTC"}, Hostname:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.794 [INFO][3998] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.794 [INFO][3998] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.794 [INFO][3998] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal' Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.796 [INFO][3998] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.802 [INFO][3998] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.807 [INFO][3998] ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.810 [INFO][3998] ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.813 [INFO][3998] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.813 [INFO][3998] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.817 [INFO][3998] ipam.go 1682: Creating new handle: k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.832 [INFO][3998] ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.841 [INFO][3998] ipam.go 1216: Successfully claimed IPs: [192.168.20.4/26] block=192.168.20.0/26 handle="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.841 [INFO][3998] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.4/26] handle="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.841 [INFO][3998] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:29.906420 env[1145]: 2024-02-12 20:53:29.841 [INFO][3998] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.20.4/26] IPv6=[] ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" HandleID="k8s-pod-network.a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.908287 env[1145]: 2024-02-12 20:53:29.843 [INFO][3979] k8s.go 385: Populated endpoint ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1c9bbdfa-5067-4e56-ab91-7515695ee5f0", ResourceVersion:"721", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-787d4945fb-kd6xq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali251b3756673", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:29.908287 env[1145]: 2024-02-12 20:53:29.843 [INFO][3979] k8s.go 386: Calico CNI using IPs: [192.168.20.4/32] ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.908287 env[1145]: 2024-02-12 20:53:29.843 [INFO][3979] dataplane_linux.go 68: Setting the host side veth name to cali251b3756673 ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.908287 env[1145]: 2024-02-12 20:53:29.878 [INFO][3979] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.908287 env[1145]: 2024-02-12 20:53:29.879 [INFO][3979] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1c9bbdfa-5067-4e56-ab91-7515695ee5f0", ResourceVersion:"721", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda", Pod:"coredns-787d4945fb-kd6xq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali251b3756673", MAC:"0e:8a:80:3f:24:23", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:29.908287 env[1145]: 2024-02-12 20:53:29.903 [INFO][3979] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda" Namespace="kube-system" Pod="coredns-787d4945fb-kd6xq" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:29.937000 audit[4031]: NETFILTER_CFG table=mangle:115 family=2 entries=19 op=nft_register_chain pid=4031 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:53:29.937000 audit[4031]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff39a97910 a2=0 a3=7fff39a978fc items=0 ppid=3639 pid=4031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:53:29.951000 audit[4049]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:29.951000 audit[4049]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffca9211320 a2=0 a3=7ffca921130c items=0 ppid=2313 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.951000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:29.965000 audit[4037]: NETFILTER_CFG table=filter:117 family=2 entries=129 op=nft_register_chain pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:53:29.965000 audit[4037]: SYSCALL arch=c000003e syscall=46 success=yes exit=70188 a0=3 a1=7ffe5678a900 a2=0 a3=56247ad47000 items=0 ppid=3639 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.966000 audit[4049]: NETFILTER_CFG table=nat:118 family=2 entries=51 op=nft_register_chain pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:29.968551 env[1145]: time="2024-02-12T20:53:29.968362880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:53:29.968551 env[1145]: time="2024-02-12T20:53:29.968452795Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:53:29.968551 env[1145]: time="2024-02-12T20:53:29.968493693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:53:29.968755 env[1145]: time="2024-02-12T20:53:29.968710299Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda pid=4057 runtime=io.containerd.runc.v2 Feb 12 20:53:29.966000 audit[4049]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7ffca9211320 a2=0 a3=7ffca921130c items=0 ppid=2313 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:29.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:29.965000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:53:30.016806 systemd[1]: run-containerd-runc-k8s.io-a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda-runc.5oyqXD.mount: Deactivated successfully. Feb 12 20:53:30.029664 systemd[1]: Started cri-containerd-a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda.scope. Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.050000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.051000 audit: BPF prog-id=174 op=LOAD Feb 12 20:53:30.053000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.053000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4057 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663133323336383561623336393434616635613336326264623865 Feb 12 20:53:30.053000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.053000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4057 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.053000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663133323336383561623336393434616635613336326264623865 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.054000 audit: BPF prog-id=175 op=LOAD Feb 12 20:53:30.054000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003e6b90 items=0 ppid=4057 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663133323336383561623336393434616635613336326264623865 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.055000 audit: BPF prog-id=176 op=LOAD Feb 12 20:53:30.055000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003e6bd8 items=0 ppid=4057 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663133323336383561623336393434616635613336326264623865 Feb 12 20:53:30.058000 audit: BPF prog-id=176 op=UNLOAD Feb 12 20:53:30.058000 audit: BPF prog-id=175 op=UNLOAD Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { perfmon } for pid=4069 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit[4069]: AVC avc: denied { bpf } for pid=4069 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.058000 audit: BPF prog-id=177 op=LOAD Feb 12 20:53:30.058000 audit[4069]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003e6fe8 items=0 ppid=4057 pid=4069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135663133323336383561623336393434616635613336326264623865 Feb 12 20:53:30.113667 env[1145]: time="2024-02-12T20:53:30.113606038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-kd6xq,Uid:1c9bbdfa-5067-4e56-ab91-7515695ee5f0,Namespace:kube-system,Attempt:1,} returns sandbox id \"a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda\"" Feb 12 20:53:30.119802 env[1145]: time="2024-02-12T20:53:30.119754235Z" level=info msg="CreateContainer within sandbox \"a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:53:30.154806 env[1145]: time="2024-02-12T20:53:30.154741297Z" level=info msg="CreateContainer within sandbox \"a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"6241ec6724e102dd36a2f84bb49fae2a36ceb2994b20054487f9a51f57b885e8\"" Feb 12 20:53:30.155863 env[1145]: time="2024-02-12T20:53:30.155804799Z" level=info msg="StartContainer for \"6241ec6724e102dd36a2f84bb49fae2a36ceb2994b20054487f9a51f57b885e8\"" Feb 12 20:53:30.158000 audit[4093]: NETFILTER_CFG table=filter:119 family=2 entries=38 op=nft_register_chain pid=4093 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:53:30.158000 audit[4093]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffedc31adf0 a2=0 a3=7ffedc31addc items=0 ppid=3639 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.158000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:53:30.189636 systemd[1]: Started cri-containerd-6241ec6724e102dd36a2f84bb49fae2a36ceb2994b20054487f9a51f57b885e8.scope. Feb 12 20:53:30.283977 systemd-networkd[1024]: vxlan.calico: Link UP Feb 12 20:53:30.283992 systemd-networkd[1024]: vxlan.calico: Gained carrier Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.300000 audit: BPF prog-id=178 op=LOAD Feb 12 20:53:30.302000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.302000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4057 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343165633637323465313032646433366132663834626234396661 Feb 12 20:53:30.302000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.302000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4057 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343165633637323465313032646433366132663834626234396661 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.303000 audit: BPF prog-id=179 op=LOAD Feb 12 20:53:30.303000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000312810 items=0 ppid=4057 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343165633637323465313032646433366132663834626234396661 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.304000 audit: BPF prog-id=180 op=LOAD Feb 12 20:53:30.304000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000312858 items=0 ppid=4057 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343165633637323465313032646433366132663834626234396661 Feb 12 20:53:30.307000 audit: BPF prog-id=180 op=UNLOAD Feb 12 20:53:30.307000 audit: BPF prog-id=179 op=UNLOAD Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { perfmon } for pid=4102 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit[4102]: AVC avc: denied { bpf } for pid=4102 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:30.307000 audit: BPF prog-id=181 op=LOAD Feb 12 20:53:30.307000 audit[4102]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000312c68 items=0 ppid=4057 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343165633637323465313032646433366132663834626234396661 Feb 12 20:53:30.388012 env[1145]: time="2024-02-12T20:53:30.387959567Z" level=info msg="StartContainer for \"6241ec6724e102dd36a2f84bb49fae2a36ceb2994b20054487f9a51f57b885e8\" returns successfully" Feb 12 20:53:30.675309 kubelet[2102]: I0212 20:53:30.675275 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-kd6xq" podStartSLOduration=38.675224649 pod.CreationTimestamp="2024-02-12 20:52:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:53:30.653476684 +0000 UTC m=+50.715748286" watchObservedRunningTime="2024-02-12 20:53:30.675224649 +0000 UTC m=+50.737496252" Feb 12 20:53:30.790000 audit[4161]: NETFILTER_CFG table=filter:120 family=2 entries=6 op=nft_register_rule pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:30.790000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff98abc1a0 a2=0 a3=7fff98abc18c items=0 ppid=2313 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:30.794000 audit[4161]: NETFILTER_CFG table=nat:121 family=2 entries=60 op=nft_register_rule pid=4161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:30.794000 audit[4161]: SYSCALL arch=c000003e syscall=46 success=yes exit=19324 a0=3 a1=7fff98abc1a0 a2=0 a3=7fff98abc18c items=0 ppid=2313 pid=4161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:30.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:31.053000 audit[4187]: NETFILTER_CFG table=filter:122 family=2 entries=6 op=nft_register_rule pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:31.053000 audit[4187]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcdf0851c0 a2=0 a3=7ffcdf0851ac items=0 ppid=2313 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:31.053000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:31.064000 audit[4187]: NETFILTER_CFG table=nat:123 family=2 entries=72 op=nft_register_chain pid=4187 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:53:31.064000 audit[4187]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffcdf0851c0 a2=0 a3=7ffcdf0851ac items=0 ppid=2313 pid=4187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:31.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:53:31.261906 systemd-networkd[1024]: cali251b3756673: Gained IPv6LL Feb 12 20:53:31.389741 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL Feb 12 20:53:32.511361 env[1145]: time="2024-02-12T20:53:32.511308923Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:32.515533 env[1145]: time="2024-02-12T20:53:32.515499417Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:32.518612 env[1145]: time="2024-02-12T20:53:32.518574812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:32.520984 env[1145]: time="2024-02-12T20:53:32.520943264Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:32.522168 env[1145]: time="2024-02-12T20:53:32.522089821Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 20:53:32.524320 env[1145]: time="2024-02-12T20:53:32.524270074Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:53:32.553584 env[1145]: time="2024-02-12T20:53:32.553527136Z" level=info msg="CreateContainer within sandbox \"aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 20:53:32.576539 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount618644176.mount: Deactivated successfully. Feb 12 20:53:32.579241 env[1145]: time="2024-02-12T20:53:32.579195121Z" level=info msg="CreateContainer within sandbox \"aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e\"" Feb 12 20:53:32.581687 env[1145]: time="2024-02-12T20:53:32.581631459Z" level=info msg="StartContainer for \"27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e\"" Feb 12 20:53:32.624920 systemd[1]: Started cri-containerd-27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e.scope. Feb 12 20:53:32.672032 kernel: kauditd_printk_skb: 491 callbacks suppressed Feb 12 20:53:32.672211 kernel: audit: type=1400 audit(1707771212.666:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.716170 kernel: audit: type=1400 audit(1707771212.666:1290): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.738199 kernel: audit: type=1400 audit(1707771212.666:1291): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.763280 kernel: audit: type=1400 audit(1707771212.666:1292): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.802085 env[1145]: time="2024-02-12T20:53:32.802027583Z" level=info msg="StartContainer for \"27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e\" returns successfully" Feb 12 20:53:32.821577 kernel: audit: type=1400 audit(1707771212.666:1293): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.821741 kernel: audit: type=1400 audit(1707771212.666:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.842772 kernel: audit: type=1400 audit(1707771212.666:1295): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.885307 kernel: audit: type=1400 audit(1707771212.666:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.885449 kernel: audit: type=1400 audit(1707771212.666:1297): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.906374 kernel: audit: type=1400 audit(1707771212.692:1298): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.692000 audit: BPF prog-id=182 op=LOAD Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cdc48 a2=10 a3=1c items=0 ppid=3725 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623563336330643561663761396335313436646435333239623730 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cd6b0 a2=3c a3=8 items=0 ppid=3725 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623563336330643561663761396335313436646435333239623730 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit: BPF prog-id=183 op=LOAD Feb 12 20:53:32.693000 audit[4198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cd9d8 a2=78 a3=c000282e10 items=0 ppid=3725 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623563336330643561663761396335313436646435333239623730 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit: BPF prog-id=184 op=LOAD Feb 12 20:53:32.693000 audit[4198]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cd770 a2=78 a3=c000282e58 items=0 ppid=3725 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623563336330643561663761396335313436646435333239623730 Feb 12 20:53:32.693000 audit: BPF prog-id=184 op=UNLOAD Feb 12 20:53:32.693000 audit: BPF prog-id=183 op=UNLOAD Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { perfmon } for pid=4198 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit[4198]: AVC avc: denied { bpf } for pid=4198 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:32.693000 audit: BPF prog-id=185 op=LOAD Feb 12 20:53:32.693000 audit[4198]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cdc30 a2=78 a3=c000283268 items=0 ppid=3725 pid=4198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:32.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237623563336330643561663761396335313436646435333239623730 Feb 12 20:53:33.637551 kubelet[2102]: I0212 20:53:33.637509 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-656d5c54f4-njlfx" podStartSLOduration=-9.22337200121734e+09 pod.CreationTimestamp="2024-02-12 20:52:58 +0000 UTC" firstStartedPulling="2024-02-12 20:53:28.818090752 +0000 UTC m=+48.880362342" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:53:33.636722213 +0000 UTC m=+53.698993818" watchObservedRunningTime="2024-02-12 20:53:33.637435703 +0000 UTC m=+53.699707307" Feb 12 20:53:33.972220 env[1145]: time="2024-02-12T20:53:33.972031068Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:33.975527 env[1145]: time="2024-02-12T20:53:33.975462579Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:33.978338 env[1145]: time="2024-02-12T20:53:33.978301551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:33.981678 env[1145]: time="2024-02-12T20:53:33.981643944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:53:33.982813 env[1145]: time="2024-02-12T20:53:33.982763152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:53:33.989270 env[1145]: time="2024-02-12T20:53:33.989227323Z" level=info msg="CreateContainer within sandbox \"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:53:34.024318 env[1145]: time="2024-02-12T20:53:34.024261569Z" level=info msg="CreateContainer within sandbox \"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"988cfba75e76e4ef48f571f9ceaab45995bc64056be43231514976756f97ae39\"" Feb 12 20:53:34.025575 env[1145]: time="2024-02-12T20:53:34.025522217Z" level=info msg="StartContainer for \"988cfba75e76e4ef48f571f9ceaab45995bc64056be43231514976756f97ae39\"" Feb 12 20:53:34.078130 systemd[1]: Started cri-containerd-988cfba75e76e4ef48f571f9ceaab45995bc64056be43231514976756f97ae39.scope. Feb 12 20:53:34.082724 systemd[1]: run-containerd-runc-k8s.io-988cfba75e76e4ef48f571f9ceaab45995bc64056be43231514976756f97ae39-runc.UeoKpP.mount: Deactivated successfully. Feb 12 20:53:34.122000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.122000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe3d4533cb8 items=0 ppid=3491 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:34.122000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386366626137356537366534656634386635373166396365616162 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.123000 audit: BPF prog-id=186 op=LOAD Feb 12 20:53:34.123000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ae4e8 items=0 ppid=3491 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:34.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386366626137356537366534656634386635373166396365616162 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.125000 audit: BPF prog-id=187 op=LOAD Feb 12 20:53:34.125000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ae538 items=0 ppid=3491 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:34.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386366626137356537366534656634386635373166396365616162 Feb 12 20:53:34.127000 audit: BPF prog-id=187 op=UNLOAD Feb 12 20:53:34.127000 audit: BPF prog-id=186 op=UNLOAD Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:53:34.127000 audit: BPF prog-id=188 op=LOAD Feb 12 20:53:34.127000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ae5c8 items=0 ppid=3491 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:34.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386366626137356537366534656634386635373166396365616162 Feb 12 20:53:34.160816 env[1145]: time="2024-02-12T20:53:34.160755226Z" level=info msg="StartContainer for \"988cfba75e76e4ef48f571f9ceaab45995bc64056be43231514976756f97ae39\" returns successfully" Feb 12 20:53:34.454402 kubelet[2102]: I0212 20:53:34.454358 2102 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:53:34.454402 kubelet[2102]: I0212 20:53:34.454407 2102 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:53:34.662739 kubelet[2102]: I0212 20:53:34.651698 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-qlf55" podStartSLOduration=-9.223372000203135e+09 pod.CreationTimestamp="2024-02-12 20:52:58 +0000 UTC" firstStartedPulling="2024-02-12 20:53:26.866695271 +0000 UTC m=+46.928966860" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:53:34.648796308 +0000 UTC m=+54.711067914" watchObservedRunningTime="2024-02-12 20:53:34.651642047 +0000 UTC m=+54.713913652" Feb 12 20:53:34.672037 systemd[1]: run-containerd-runc-k8s.io-27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e-runc.RZBURp.mount: Deactivated successfully. Feb 12 20:53:35.965000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:35.965000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002325da0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:35.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:35.966000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:35.966000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a620 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:35.966000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:36.456000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:36.456000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:36.456000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c005251d10 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:53:36.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:53:36.456000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0132588a0 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:53:36.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:53:36.457000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:36.457000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c008d5d530 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:53:36.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:53:36.459000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:36.459000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c005251da0 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:53:36.459000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:53:36.462000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:36.462000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c013258a00 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:53:36.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:53:36.463000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:36.463000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c008d5d9b0 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:53:36.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:53:38.945000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:38.953976 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 12 20:53:38.954122 kernel: audit: type=1400 audit(1707771218.945:1321): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:38.945000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a7a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:39.012655 kernel: audit: type=1300 audit(1707771218.945:1321): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a7a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:39.012835 kernel: audit: type=1327 audit(1707771218.945:1321): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:38.945000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:38.949000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:39.067180 kernel: audit: type=1400 audit(1707771218.949:1322): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:39.067341 kernel: audit: type=1300 audit(1707771218.949:1322): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a8c0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:38.949000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a8c0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:38.949000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:39.130295 kernel: audit: type=1327 audit(1707771218.949:1322): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:39.130506 kernel: audit: type=1400 audit(1707771218.953:1323): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:38.953000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:38.953000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024c2f80 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:39.190465 kernel: audit: type=1300 audit(1707771218.953:1323): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0024c2f80 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:39.190662 kernel: audit: type=1327 audit(1707771218.953:1323): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:38.953000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:39.219304 kernel: audit: type=1400 audit(1707771218.957:1324): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:38.957000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:53:38.957000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a9e0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:53:38.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:53:40.138691 env[1145]: time="2024-02-12T20:53:40.138563926Z" level=info msg="StopPodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\"" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.193 [WARNING][4315] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0", GenerateName:"calico-kube-controllers-656d5c54f4-", Namespace:"calico-system", SelfLink:"", UID:"4c3a7e78-0095-45b8-b59e-db5a730f12ba", ResourceVersion:"768", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656d5c54f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306", Pod:"calico-kube-controllers-656d5c54f4-njlfx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali300df014147", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.193 [INFO][4315] k8s.go 578: Cleaning up netns ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.194 [INFO][4315] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" iface="eth0" netns="" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.194 [INFO][4315] k8s.go 585: Releasing IP address(es) ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.194 [INFO][4315] utils.go 188: Calico CNI releasing IP address ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.224 [INFO][4323] ipam_plugin.go 415: Releasing address using handleID ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.224 [INFO][4323] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.224 [INFO][4323] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.234 [WARNING][4323] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.234 [INFO][4323] ipam_plugin.go 443: Releasing address using workloadID ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.238 [INFO][4323] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.240835 env[1145]: 2024-02-12 20:53:40.239 [INFO][4315] k8s.go 591: Teardown processing complete. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.241981 env[1145]: time="2024-02-12T20:53:40.240877608Z" level=info msg="TearDown network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" successfully" Feb 12 20:53:40.241981 env[1145]: time="2024-02-12T20:53:40.240927100Z" level=info msg="StopPodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" returns successfully" Feb 12 20:53:40.242120 env[1145]: time="2024-02-12T20:53:40.242087647Z" level=info msg="RemovePodSandbox for \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\"" Feb 12 20:53:40.242245 env[1145]: time="2024-02-12T20:53:40.242135420Z" level=info msg="Forcibly stopping sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\"" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.287 [WARNING][4343] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0", GenerateName:"calico-kube-controllers-656d5c54f4-", Namespace:"calico-system", SelfLink:"", UID:"4c3a7e78-0095-45b8-b59e-db5a730f12ba", ResourceVersion:"768", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656d5c54f4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"aec3f18e3782df59fd91cbcca249127f4f9aa3b53d9b82d41cc10bdfe9779306", Pod:"calico-kube-controllers-656d5c54f4-njlfx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.20.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali300df014147", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.287 [INFO][4343] k8s.go 578: Cleaning up netns ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.287 [INFO][4343] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" iface="eth0" netns="" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.288 [INFO][4343] k8s.go 585: Releasing IP address(es) ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.288 [INFO][4343] utils.go 188: Calico CNI releasing IP address ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.317 [INFO][4350] ipam_plugin.go 415: Releasing address using handleID ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.317 [INFO][4350] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.317 [INFO][4350] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.325 [WARNING][4350] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.325 [INFO][4350] ipam_plugin.go 443: Releasing address using workloadID ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" HandleID="k8s-pod-network.19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--kube--controllers--656d5c54f4--njlfx-eth0" Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.327 [INFO][4350] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.330356 env[1145]: 2024-02-12 20:53:40.329 [INFO][4343] k8s.go 591: Teardown processing complete. ContainerID="19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d" Feb 12 20:53:40.331315 env[1145]: time="2024-02-12T20:53:40.330400556Z" level=info msg="TearDown network for sandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" successfully" Feb 12 20:53:40.335873 env[1145]: time="2024-02-12T20:53:40.335818127Z" level=info msg="RemovePodSandbox \"19961f6f4a490ed3a1d9b1461154374da969aba5125f62d234160cc0f0adef9d\" returns successfully" Feb 12 20:53:40.336688 env[1145]: time="2024-02-12T20:53:40.336637704Z" level=info msg="StopPodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\"" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.396 [WARNING][4370] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1c9bbdfa-5067-4e56-ab91-7515695ee5f0", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda", Pod:"coredns-787d4945fb-kd6xq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali251b3756673", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.396 [INFO][4370] k8s.go 578: Cleaning up netns ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.396 [INFO][4370] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" iface="eth0" netns="" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.396 [INFO][4370] k8s.go 585: Releasing IP address(es) ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.396 [INFO][4370] utils.go 188: Calico CNI releasing IP address ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.425 [INFO][4377] ipam_plugin.go 415: Releasing address using handleID ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.426 [INFO][4377] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.426 [INFO][4377] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.434 [WARNING][4377] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.434 [INFO][4377] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.436 [INFO][4377] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.441079 env[1145]: 2024-02-12 20:53:40.437 [INFO][4370] k8s.go 591: Teardown processing complete. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.441079 env[1145]: time="2024-02-12T20:53:40.438627575Z" level=info msg="TearDown network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" successfully" Feb 12 20:53:40.441079 env[1145]: time="2024-02-12T20:53:40.438669544Z" level=info msg="StopPodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" returns successfully" Feb 12 20:53:40.441079 env[1145]: time="2024-02-12T20:53:40.439214934Z" level=info msg="RemovePodSandbox for \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\"" Feb 12 20:53:40.441079 env[1145]: time="2024-02-12T20:53:40.439263264Z" level=info msg="Forcibly stopping sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\"" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.486 [WARNING][4396] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"1c9bbdfa-5067-4e56-ab91-7515695ee5f0", ResourceVersion:"737", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"a5f1323685ab36944af5a362bdb8e45fb2a51467700c926500eb92442f668bda", Pod:"coredns-787d4945fb-kd6xq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali251b3756673", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.486 [INFO][4396] k8s.go 578: Cleaning up netns ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.487 [INFO][4396] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" iface="eth0" netns="" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.487 [INFO][4396] k8s.go 585: Releasing IP address(es) ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.487 [INFO][4396] utils.go 188: Calico CNI releasing IP address ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.513 [INFO][4402] ipam_plugin.go 415: Releasing address using handleID ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.514 [INFO][4402] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.514 [INFO][4402] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.522 [WARNING][4402] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.522 [INFO][4402] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" HandleID="k8s-pod-network.e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--kd6xq-eth0" Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.523 [INFO][4402] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.526137 env[1145]: 2024-02-12 20:53:40.525 [INFO][4396] k8s.go 591: Teardown processing complete. ContainerID="e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21" Feb 12 20:53:40.526137 env[1145]: time="2024-02-12T20:53:40.526119026Z" level=info msg="TearDown network for sandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" successfully" Feb 12 20:53:40.531234 env[1145]: time="2024-02-12T20:53:40.531168390Z" level=info msg="RemovePodSandbox \"e4ff91ed908c1ad18286bab94e2ac660366202883548df5e9c4d4b4b542e3c21\" returns successfully" Feb 12 20:53:40.531912 env[1145]: time="2024-02-12T20:53:40.531849235Z" level=info msg="StopPodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\"" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.576 [WARNING][4420] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88583db7-8063-476f-967e-ffbf294ccd01", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe", Pod:"csi-node-driver-qlf55", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14b0d4f1764", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.576 [INFO][4420] k8s.go 578: Cleaning up netns ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.576 [INFO][4420] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" iface="eth0" netns="" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.576 [INFO][4420] k8s.go 585: Releasing IP address(es) ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.576 [INFO][4420] utils.go 188: Calico CNI releasing IP address ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.601 [INFO][4426] ipam_plugin.go 415: Releasing address using handleID ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.601 [INFO][4426] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.601 [INFO][4426] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.611 [WARNING][4426] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.611 [INFO][4426] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.613 [INFO][4426] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.616724 env[1145]: 2024-02-12 20:53:40.615 [INFO][4420] k8s.go 591: Teardown processing complete. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.617865 env[1145]: time="2024-02-12T20:53:40.616771513Z" level=info msg="TearDown network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" successfully" Feb 12 20:53:40.617865 env[1145]: time="2024-02-12T20:53:40.616811547Z" level=info msg="StopPodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" returns successfully" Feb 12 20:53:40.617865 env[1145]: time="2024-02-12T20:53:40.617436081Z" level=info msg="RemovePodSandbox for \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\"" Feb 12 20:53:40.617865 env[1145]: time="2024-02-12T20:53:40.617479700Z" level=info msg="Forcibly stopping sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\"" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.680 [WARNING][4445] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"88583db7-8063-476f-967e-ffbf294ccd01", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"abe8601ff8fdc5c4d6d9ef97c38c68452421e6ea72864bd7a3445422f53689fe", Pod:"csi-node-driver-qlf55", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.20.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali14b0d4f1764", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.681 [INFO][4445] k8s.go 578: Cleaning up netns ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.681 [INFO][4445] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" iface="eth0" netns="" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.681 [INFO][4445] k8s.go 585: Releasing IP address(es) ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.681 [INFO][4445] utils.go 188: Calico CNI releasing IP address ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.720 [INFO][4453] ipam_plugin.go 415: Releasing address using handleID ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.720 [INFO][4453] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.720 [INFO][4453] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.727 [WARNING][4453] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.727 [INFO][4453] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" HandleID="k8s-pod-network.c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-csi--node--driver--qlf55-eth0" Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.729 [INFO][4453] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.734226 env[1145]: 2024-02-12 20:53:40.730 [INFO][4445] k8s.go 591: Teardown processing complete. ContainerID="c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127" Feb 12 20:53:40.734226 env[1145]: time="2024-02-12T20:53:40.731770815Z" level=info msg="TearDown network for sandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" successfully" Feb 12 20:53:40.737613 env[1145]: time="2024-02-12T20:53:40.737562400Z" level=info msg="RemovePodSandbox \"c6aaa81e28671b55737966f87a931c634fa1d05ed2a24292f2101e4162299127\" returns successfully" Feb 12 20:53:40.738141 env[1145]: time="2024-02-12T20:53:40.738088489Z" level=info msg="StopPodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\"" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.778 [WARNING][4471] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"78477bf0-d44a-434d-bcec-6b3a484f17bd", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875", Pod:"coredns-787d4945fb-svvh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibed370de67b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.779 [INFO][4471] k8s.go 578: Cleaning up netns ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.779 [INFO][4471] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" iface="eth0" netns="" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.779 [INFO][4471] k8s.go 585: Releasing IP address(es) ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.779 [INFO][4471] utils.go 188: Calico CNI releasing IP address ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.805 [INFO][4477] ipam_plugin.go 415: Releasing address using handleID ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.805 [INFO][4477] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.805 [INFO][4477] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.814 [WARNING][4477] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.814 [INFO][4477] ipam_plugin.go 443: Releasing address using workloadID ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.816 [INFO][4477] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.819326 env[1145]: 2024-02-12 20:53:40.817 [INFO][4471] k8s.go 591: Teardown processing complete. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.820235 env[1145]: time="2024-02-12T20:53:40.819357196Z" level=info msg="TearDown network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" successfully" Feb 12 20:53:40.820235 env[1145]: time="2024-02-12T20:53:40.819400510Z" level=info msg="StopPodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" returns successfully" Feb 12 20:53:40.820836 env[1145]: time="2024-02-12T20:53:40.820795857Z" level=info msg="RemovePodSandbox for \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\"" Feb 12 20:53:40.820979 env[1145]: time="2024-02-12T20:53:40.820843528Z" level=info msg="Forcibly stopping sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\"" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.864 [WARNING][4495] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"78477bf0-d44a-434d-bcec-6b3a484f17bd", ResourceVersion:"722", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 52, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"ed3edca3b7e30cc31fccf238f3b19e5faa0c9f4ece1a306d19a38a2518c69875", Pod:"coredns-787d4945fb-svvh9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.20.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibed370de67b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.864 [INFO][4495] k8s.go 578: Cleaning up netns ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.864 [INFO][4495] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" iface="eth0" netns="" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.864 [INFO][4495] k8s.go 585: Releasing IP address(es) ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.864 [INFO][4495] utils.go 188: Calico CNI releasing IP address ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.888 [INFO][4501] ipam_plugin.go 415: Releasing address using handleID ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.888 [INFO][4501] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.888 [INFO][4501] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.899 [WARNING][4501] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.899 [INFO][4501] ipam_plugin.go 443: Releasing address using workloadID ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" HandleID="k8s-pod-network.03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-coredns--787d4945fb--svvh9-eth0" Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.901 [INFO][4501] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:53:40.904131 env[1145]: 2024-02-12 20:53:40.902 [INFO][4495] k8s.go 591: Teardown processing complete. ContainerID="03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f" Feb 12 20:53:40.905013 env[1145]: time="2024-02-12T20:53:40.904206397Z" level=info msg="TearDown network for sandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" successfully" Feb 12 20:53:40.909399 env[1145]: time="2024-02-12T20:53:40.909329788Z" level=info msg="RemovePodSandbox \"03ea8970ba974bfcf0681190b5a7d71014bc7d7d0f9ee7aa543168588a33616f\" returns successfully" Feb 12 20:53:42.170601 systemd[1]: run-containerd-runc-k8s.io-27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e-runc.RXCGMO.mount: Deactivated successfully. Feb 12 20:53:48.404351 systemd[1]: Started sshd@7-10.128.0.39:22-147.75.109.163:34986.service. Feb 12 20:53:48.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.39:22-147.75.109.163:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:48.437180 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 20:53:48.437323 kernel: audit: type=1130 audit(1707771228.404:1325): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.39:22-147.75.109.163:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:48.698000 audit[4529]: USER_ACCT pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.700226 sshd[4529]: Accepted publickey for core from 147.75.109.163 port 34986 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:53:48.732613 kernel: audit: type=1101 audit(1707771228.698:1326): pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.732784 kernel: audit: type=1103 audit(1707771228.730:1327): pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.730000 audit[4529]: CRED_ACQ pid=4529 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.732429 sshd[4529]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:53:48.750533 systemd[1]: Started session-8.scope. Feb 12 20:53:48.752706 systemd-logind[1131]: New session 8 of user core. Feb 12 20:53:48.730000 audit[4529]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc07b0ee20 a2=3 a3=0 items=0 ppid=1 pid=4529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:48.807067 kernel: audit: type=1006 audit(1707771228.730:1328): pid=4529 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Feb 12 20:53:48.807535 kernel: audit: type=1300 audit(1707771228.730:1328): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc07b0ee20 a2=3 a3=0 items=0 ppid=1 pid=4529 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:48.807606 kernel: audit: type=1327 audit(1707771228.730:1328): proctitle=737368643A20636F7265205B707269765D Feb 12 20:53:48.730000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:53:48.761000 audit[4529]: USER_START pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.850301 kernel: audit: type=1105 audit(1707771228.761:1329): pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.850446 kernel: audit: type=1103 audit(1707771228.765:1330): pid=4531 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:48.765000 audit[4531]: CRED_ACQ pid=4531 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:49.246204 sshd[4529]: pam_unix(sshd:session): session closed for user core Feb 12 20:53:49.247000 audit[4529]: USER_END pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:49.251358 systemd[1]: sshd@7-10.128.0.39:22-147.75.109.163:34986.service: Deactivated successfully. Feb 12 20:53:49.252589 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 20:53:49.256821 systemd-logind[1131]: Session 8 logged out. Waiting for processes to exit. Feb 12 20:53:49.258890 systemd-logind[1131]: Removed session 8. Feb 12 20:53:49.283208 kernel: audit: type=1106 audit(1707771229.247:1331): pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:49.283399 kernel: audit: type=1104 audit(1707771229.247:1332): pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:49.247000 audit[4529]: CRED_DISP pid=4529 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:49.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.39:22-147.75.109.163:34986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:54.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.39:22-147.75.109.163:34994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:54.293702 systemd[1]: Started sshd@8-10.128.0.39:22-147.75.109.163:34994.service. Feb 12 20:53:54.299708 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:53:54.299850 kernel: audit: type=1130 audit(1707771234.293:1334): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.39:22-147.75.109.163:34994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:54.586000 audit[4554]: USER_ACCT pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.598686 sshd[4554]: Accepted publickey for core from 147.75.109.163 port 34994 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:53:54.618182 kernel: audit: type=1101 audit(1707771234.586:1335): pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.619031 sshd[4554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:53:54.617000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.629289 systemd[1]: Started session-9.scope. Feb 12 20:53:54.631207 systemd-logind[1131]: New session 9 of user core. Feb 12 20:53:54.649219 kernel: audit: type=1103 audit(1707771234.617:1336): pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.617000 audit[4554]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e33cdb0 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:54.699928 kernel: audit: type=1006 audit(1707771234.617:1337): pid=4554 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 20:53:54.700109 kernel: audit: type=1300 audit(1707771234.617:1337): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e33cdb0 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:53:54.617000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:53:54.649000 audit[4554]: USER_START pid=4554 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.742196 kernel: audit: type=1327 audit(1707771234.617:1337): proctitle=737368643A20636F7265205B707269765D Feb 12 20:53:54.742361 kernel: audit: type=1105 audit(1707771234.649:1338): pid=4554 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.742408 kernel: audit: type=1103 audit(1707771234.652:1339): pid=4556 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.652000 audit[4556]: CRED_ACQ pid=4556 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.896063 systemd[1]: run-containerd-runc-k8s.io-9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3-runc.eaZUBx.mount: Deactivated successfully. Feb 12 20:53:54.901695 sshd[4554]: pam_unix(sshd:session): session closed for user core Feb 12 20:53:54.904000 audit[4554]: USER_END pid=4554 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.932952 systemd[1]: sshd@8-10.128.0.39:22-147.75.109.163:34994.service: Deactivated successfully. Feb 12 20:53:54.934214 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:53:54.929000 audit[4554]: CRED_DISP pid=4554 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.941819 systemd-logind[1131]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:53:54.943455 systemd-logind[1131]: Removed session 9. Feb 12 20:53:54.963000 kernel: audit: type=1106 audit(1707771234.904:1340): pid=4554 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.963127 kernel: audit: type=1104 audit(1707771234.929:1341): pid=4554 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:53:54.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.39:22-147.75.109.163:34994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:59.948582 systemd[1]: Started sshd@9-10.128.0.39:22-147.75.109.163:46280.service. Feb 12 20:53:59.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.39:22-147.75.109.163:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:53:59.954720 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:53:59.954849 kernel: audit: type=1130 audit(1707771239.948:1343): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.39:22-147.75.109.163:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:00.242000 audit[4589]: USER_ACCT pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.245717 sshd[4589]: Accepted publickey for core from 147.75.109.163 port 46280 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:00.274175 kernel: audit: type=1101 audit(1707771240.242:1344): pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.273000 audit[4589]: CRED_ACQ pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.275645 sshd[4589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:00.284289 systemd[1]: Started session-10.scope. Feb 12 20:54:00.286412 systemd-logind[1131]: New session 10 of user core. Feb 12 20:54:00.302732 kernel: audit: type=1103 audit(1707771240.273:1345): pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.302857 kernel: audit: type=1006 audit(1707771240.273:1346): pid=4589 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 20:54:00.273000 audit[4589]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe30c5c2c0 a2=3 a3=0 items=0 ppid=1 pid=4589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:00.346636 kernel: audit: type=1300 audit(1707771240.273:1346): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe30c5c2c0 a2=3 a3=0 items=0 ppid=1 pid=4589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:00.346772 kernel: audit: type=1327 audit(1707771240.273:1346): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:00.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:00.356412 kernel: audit: type=1105 audit(1707771240.297:1347): pid=4589 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.297000 audit[4589]: USER_START pid=4589 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.300000 audit[4591]: CRED_ACQ pid=4591 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.413010 kernel: audit: type=1103 audit(1707771240.300:1348): pid=4591 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.557462 sshd[4589]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:00.558000 audit[4589]: USER_END pid=4589 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.562857 systemd[1]: sshd@9-10.128.0.39:22-147.75.109.163:46280.service: Deactivated successfully. Feb 12 20:54:00.568750 systemd-logind[1131]: Session 10 logged out. Waiting for processes to exit. Feb 12 20:54:00.558000 audit[4589]: CRED_DISP pid=4589 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.594752 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 20:54:00.596771 systemd-logind[1131]: Removed session 10. Feb 12 20:54:00.618967 kernel: audit: type=1106 audit(1707771240.558:1349): pid=4589 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.619091 kernel: audit: type=1104 audit(1707771240.558:1350): pid=4589 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:00.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.39:22-147.75.109.163:46280 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:05.603620 systemd[1]: Started sshd@10-10.128.0.39:22-147.75.109.163:36740.service. Feb 12 20:54:05.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.39:22-147.75.109.163:36740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:05.611503 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:54:05.611616 kernel: audit: type=1130 audit(1707771245.602:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.39:22-147.75.109.163:36740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:05.665812 systemd[1]: run-containerd-runc-k8s.io-27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e-runc.bwlFOf.mount: Deactivated successfully. Feb 12 20:54:05.908000 audit[4602]: USER_ACCT pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:05.911475 sshd[4602]: Accepted publickey for core from 147.75.109.163 port 36740 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:05.940513 kernel: audit: type=1101 audit(1707771245.908:1353): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:05.940673 kernel: audit: type=1103 audit(1707771245.938:1354): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:05.938000 audit[4602]: CRED_ACQ pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:05.940946 sshd[4602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:05.950087 systemd[1]: Started session-11.scope. Feb 12 20:54:05.951218 systemd-logind[1131]: New session 11 of user core. Feb 12 20:54:05.989962 kernel: audit: type=1006 audit(1707771245.938:1355): pid=4602 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 20:54:05.990091 kernel: audit: type=1300 audit(1707771245.938:1355): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe50fdab70 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:05.938000 audit[4602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe50fdab70 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:06.011194 kernel: audit: type=1327 audit(1707771245.938:1355): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:05.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:05.960000 audit[4602]: USER_START pid=4602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.052828 kernel: audit: type=1105 audit(1707771245.960:1356): pid=4602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:05.965000 audit[4625]: CRED_ACQ pid=4625 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.077213 kernel: audit: type=1103 audit(1707771245.965:1357): pid=4625 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.212643 sshd[4602]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:06.248374 kernel: audit: type=1106 audit(1707771246.214:1358): pid=4602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.214000 audit[4602]: USER_END pid=4602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.250919 systemd-logind[1131]: Session 11 logged out. Waiting for processes to exit. Feb 12 20:54:06.214000 audit[4602]: CRED_DISP pid=4602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.280256 kernel: audit: type=1104 audit(1707771246.214:1359): pid=4602 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.281722 systemd[1]: Started sshd@11-10.128.0.39:22-147.75.109.163:36754.service. Feb 12 20:54:06.284424 systemd[1]: sshd@10-10.128.0.39:22-147.75.109.163:36740.service: Deactivated successfully. Feb 12 20:54:06.286997 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 20:54:06.288601 systemd-logind[1131]: Removed session 11. Feb 12 20:54:06.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.39:22-147.75.109.163:36754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:06.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.39:22-147.75.109.163:36740 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:06.577000 audit[4636]: USER_ACCT pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.578722 sshd[4636]: Accepted publickey for core from 147.75.109.163 port 36754 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:06.579000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.579000 audit[4636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecccf0d20 a2=3 a3=0 items=0 ppid=1 pid=4636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:06.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:06.581256 sshd[4636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:06.588176 systemd-logind[1131]: New session 12 of user core. Feb 12 20:54:06.588943 systemd[1]: Started session-12.scope. Feb 12 20:54:06.596000 audit[4636]: USER_START pid=4636 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:06.599000 audit[4639]: CRED_ACQ pid=4639 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:07.916719 sshd[4636]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:07.918000 audit[4636]: USER_END pid=4636 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:07.918000 audit[4636]: CRED_DISP pid=4636 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:07.922112 systemd[1]: sshd@11-10.128.0.39:22-147.75.109.163:36754.service: Deactivated successfully. Feb 12 20:54:07.923332 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 20:54:07.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.39:22-147.75.109.163:36754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:07.924495 systemd-logind[1131]: Session 12 logged out. Waiting for processes to exit. Feb 12 20:54:07.925805 systemd-logind[1131]: Removed session 12. Feb 12 20:54:07.965273 systemd[1]: Started sshd@12-10.128.0.39:22-147.75.109.163:36756.service. Feb 12 20:54:07.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.39:22-147.75.109.163:36756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:08.262000 audit[4647]: USER_ACCT pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:08.264959 sshd[4647]: Accepted publickey for core from 147.75.109.163 port 36756 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:08.264000 audit[4647]: CRED_ACQ pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:08.264000 audit[4647]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2dbd8cd0 a2=3 a3=0 items=0 ppid=1 pid=4647 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:08.264000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:08.266385 sshd[4647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:08.273343 systemd[1]: Started session-13.scope. Feb 12 20:54:08.274183 systemd-logind[1131]: New session 13 of user core. Feb 12 20:54:08.280000 audit[4647]: USER_START pid=4647 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:08.282000 audit[4649]: CRED_ACQ pid=4649 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:08.568950 sshd[4647]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:08.570000 audit[4647]: USER_END pid=4647 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:08.570000 audit[4647]: CRED_DISP pid=4647 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:08.573830 systemd[1]: sshd@12-10.128.0.39:22-147.75.109.163:36756.service: Deactivated successfully. Feb 12 20:54:08.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.39:22-147.75.109.163:36756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:08.575531 systemd-logind[1131]: Session 13 logged out. Waiting for processes to exit. Feb 12 20:54:08.575576 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 20:54:08.577459 systemd-logind[1131]: Removed session 13. Feb 12 20:54:12.171074 systemd[1]: run-containerd-runc-k8s.io-27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e-runc.svYlq0.mount: Deactivated successfully. Feb 12 20:54:13.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.39:22-147.75.109.163:36766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:13.621498 systemd[1]: Started sshd@13-10.128.0.39:22-147.75.109.163:36766.service. Feb 12 20:54:13.627164 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 20:54:13.627343 kernel: audit: type=1130 audit(1707771253.620:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.39:22-147.75.109.163:36766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:13.914000 audit[4695]: USER_ACCT pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:13.917647 sshd[4695]: Accepted publickey for core from 147.75.109.163 port 36766 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:13.946283 kernel: audit: type=1101 audit(1707771253.914:1380): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:13.944000 audit[4695]: CRED_ACQ pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:13.947113 sshd[4695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:13.955523 systemd[1]: Started session-14.scope. Feb 12 20:54:13.957859 systemd-logind[1131]: New session 14 of user core. Feb 12 20:54:13.973216 kernel: audit: type=1103 audit(1707771253.944:1381): pid=4695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:13.973319 kernel: audit: type=1006 audit(1707771253.944:1382): pid=4695 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 20:54:13.944000 audit[4695]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeec39140 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:13.989259 kernel: audit: type=1300 audit(1707771253.944:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeeec39140 a2=3 a3=0 items=0 ppid=1 pid=4695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:13.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:14.017285 kernel: audit: type=1327 audit(1707771253.944:1382): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:13.966000 audit[4695]: USER_START pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.027260 kernel: audit: type=1105 audit(1707771253.966:1383): pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:13.969000 audit[4697]: CRED_ACQ pid=4697 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.083000 kernel: audit: type=1103 audit(1707771253.969:1384): pid=4697 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.264513 sshd[4695]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:14.265000 audit[4695]: USER_END pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.269520 systemd-logind[1131]: Session 14 logged out. Waiting for processes to exit. Feb 12 20:54:14.270950 systemd[1]: sshd@13-10.128.0.39:22-147.75.109.163:36766.service: Deactivated successfully. Feb 12 20:54:14.272114 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 20:54:14.274104 systemd-logind[1131]: Removed session 14. Feb 12 20:54:14.299177 kernel: audit: type=1106 audit(1707771254.265:1385): pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.299427 kernel: audit: type=1104 audit(1707771254.265:1386): pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.265000 audit[4695]: CRED_DISP pid=4695 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:14.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.39:22-147.75.109.163:36766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:19.311178 systemd[1]: Started sshd@14-10.128.0.39:22-147.75.109.163:46356.service. Feb 12 20:54:19.342353 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:54:19.342485 kernel: audit: type=1130 audit(1707771259.310:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.39:22-147.75.109.163:46356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:19.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.39:22-147.75.109.163:46356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:19.603000 audit[4708]: USER_ACCT pid=4708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.605132 sshd[4708]: Accepted publickey for core from 147.75.109.163 port 46356 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:19.635277 kernel: audit: type=1101 audit(1707771259.603:1389): pid=4708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.633000 audit[4708]: CRED_ACQ pid=4708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.635746 sshd[4708]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:19.645228 systemd[1]: Started session-15.scope. Feb 12 20:54:19.646400 systemd-logind[1131]: New session 15 of user core. Feb 12 20:54:19.661222 kernel: audit: type=1103 audit(1707771259.633:1390): pid=4708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.634000 audit[4708]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce5883e30 a2=3 a3=0 items=0 ppid=1 pid=4708 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:19.678261 kernel: audit: type=1006 audit(1707771259.634:1391): pid=4708 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 20:54:19.678329 kernel: audit: type=1300 audit(1707771259.634:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce5883e30 a2=3 a3=0 items=0 ppid=1 pid=4708 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:19.634000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:19.715184 kernel: audit: type=1327 audit(1707771259.634:1391): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:19.655000 audit[4708]: USER_START pid=4708 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.748140 kernel: audit: type=1105 audit(1707771259.655:1392): pid=4708 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.659000 audit[4710]: CRED_ACQ pid=4710 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.773196 kernel: audit: type=1103 audit(1707771259.659:1393): pid=4710 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.907961 sshd[4708]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:19.909000 audit[4708]: USER_END pid=4708 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.943173 kernel: audit: type=1106 audit(1707771259.909:1394): pid=4708 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.909000 audit[4708]: CRED_DISP pid=4708 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:19.946566 systemd-logind[1131]: Session 15 logged out. Waiting for processes to exit. Feb 12 20:54:19.949164 systemd[1]: sshd@14-10.128.0.39:22-147.75.109.163:46356.service: Deactivated successfully. Feb 12 20:54:19.950323 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 20:54:19.953161 systemd-logind[1131]: Removed session 15. Feb 12 20:54:19.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.39:22-147.75.109.163:46356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:19.970266 kernel: audit: type=1104 audit(1707771259.909:1395): pid=4708 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:24.896761 systemd[1]: run-containerd-runc-k8s.io-9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3-runc.kB5V9T.mount: Deactivated successfully. Feb 12 20:54:24.963346 systemd[1]: Started sshd@15-10.128.0.39:22-147.75.109.163:51106.service. Feb 12 20:54:24.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.39:22-147.75.109.163:51106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:24.970191 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:54:24.970292 kernel: audit: type=1130 audit(1707771264.962:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.39:22-147.75.109.163:51106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:25.254000 audit[4746]: USER_ACCT pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.258161 sshd[4746]: Accepted publickey for core from 147.75.109.163 port 51106 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:25.286283 kernel: audit: type=1101 audit(1707771265.254:1398): pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.285000 audit[4746]: CRED_ACQ pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.287494 sshd[4746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:25.296207 systemd[1]: Started session-16.scope. Feb 12 20:54:25.298704 systemd-logind[1131]: New session 16 of user core. Feb 12 20:54:25.328838 kernel: audit: type=1103 audit(1707771265.285:1399): pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.329041 kernel: audit: type=1006 audit(1707771265.285:1400): pid=4746 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 20:54:25.285000 audit[4746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00265ad0 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:25.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:25.368839 kernel: audit: type=1300 audit(1707771265.285:1400): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe00265ad0 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:25.369041 kernel: audit: type=1327 audit(1707771265.285:1400): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:25.369105 kernel: audit: type=1105 audit(1707771265.305:1401): pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.305000 audit[4746]: USER_START pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.311000 audit[4748]: CRED_ACQ pid=4748 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.402257 kernel: audit: type=1103 audit(1707771265.311:1402): pid=4748 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.565289 sshd[4746]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:25.567000 audit[4746]: USER_END pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.571252 systemd[1]: sshd@15-10.128.0.39:22-147.75.109.163:51106.service: Deactivated successfully. Feb 12 20:54:25.572467 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 20:54:25.576459 systemd-logind[1131]: Session 16 logged out. Waiting for processes to exit. Feb 12 20:54:25.578080 systemd-logind[1131]: Removed session 16. Feb 12 20:54:25.567000 audit[4746]: CRED_DISP pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.601184 kernel: audit: type=1106 audit(1707771265.567:1403): pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.601243 kernel: audit: type=1104 audit(1707771265.567:1404): pid=4746 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:25.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.39:22-147.75.109.163:51106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:30.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.39:22-147.75.109.163:51114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:30.612817 systemd[1]: Started sshd@16-10.128.0.39:22-147.75.109.163:51114.service. Feb 12 20:54:30.619341 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:54:30.619443 kernel: audit: type=1130 audit(1707771270.611:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.39:22-147.75.109.163:51114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:30.951579 kernel: audit: type=1101 audit(1707771270.917:1407): pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:30.917000 audit[4758]: USER_ACCT pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:30.922199 sshd[4758]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:30.952368 sshd[4758]: Accepted publickey for core from 147.75.109.163 port 51114 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:30.919000 audit[4758]: CRED_ACQ pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:30.966205 systemd[1]: Started session-17.scope. Feb 12 20:54:30.968134 systemd-logind[1131]: New session 17 of user core. Feb 12 20:54:30.980896 kernel: audit: type=1103 audit(1707771270.919:1408): pid=4758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:30.981012 kernel: audit: type=1006 audit(1707771270.919:1409): pid=4758 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 20:54:30.919000 audit[4758]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffae3665d0 a2=3 a3=0 items=0 ppid=1 pid=4758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:31.023526 kernel: audit: type=1300 audit(1707771270.919:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffae3665d0 a2=3 a3=0 items=0 ppid=1 pid=4758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:31.031215 kernel: audit: type=1327 audit(1707771270.919:1409): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:30.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:30.972000 audit[4758]: USER_START pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.065902 kernel: audit: type=1105 audit(1707771270.972:1410): pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:30.978000 audit[4760]: CRED_ACQ pid=4760 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.090323 kernel: audit: type=1103 audit(1707771270.978:1411): pid=4760 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.294954 sshd[4758]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:31.297000 audit[4758]: USER_END pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.301693 systemd-logind[1131]: Session 17 logged out. Waiting for processes to exit. Feb 12 20:54:31.303320 systemd[1]: sshd@16-10.128.0.39:22-147.75.109.163:51114.service: Deactivated successfully. Feb 12 20:54:31.304517 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 20:54:31.307138 systemd-logind[1131]: Removed session 17. Feb 12 20:54:31.331176 kernel: audit: type=1106 audit(1707771271.297:1412): pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.331317 kernel: audit: type=1104 audit(1707771271.297:1413): pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.297000 audit[4758]: CRED_DISP pid=4758 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.362586 systemd[1]: Started sshd@17-10.128.0.39:22-147.75.109.163:51128.service. Feb 12 20:54:31.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.39:22-147.75.109.163:51114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:31.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.39:22-147.75.109.163:51128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:31.660000 audit[4769]: USER_ACCT pid=4769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.661747 sshd[4769]: Accepted publickey for core from 147.75.109.163 port 51128 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:31.662000 audit[4769]: CRED_ACQ pid=4769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.662000 audit[4769]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccf345660 a2=3 a3=0 items=0 ppid=1 pid=4769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:31.662000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:31.663987 sshd[4769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:31.670907 systemd[1]: Started session-18.scope. Feb 12 20:54:31.671524 systemd-logind[1131]: New session 18 of user core. Feb 12 20:54:31.684000 audit[4769]: USER_START pid=4769 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:31.687000 audit[4771]: CRED_ACQ pid=4771 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:32.050476 sshd[4769]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:32.050000 audit[4769]: USER_END pid=4769 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:32.050000 audit[4769]: CRED_DISP pid=4769 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:32.055937 systemd[1]: sshd@17-10.128.0.39:22-147.75.109.163:51128.service: Deactivated successfully. Feb 12 20:54:32.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.39:22-147.75.109.163:51128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:32.057121 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 20:54:32.057222 systemd-logind[1131]: Session 18 logged out. Waiting for processes to exit. Feb 12 20:54:32.059580 systemd-logind[1131]: Removed session 18. Feb 12 20:54:32.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.39:22-147.75.109.163:51134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:32.106338 systemd[1]: Started sshd@18-10.128.0.39:22-147.75.109.163:51134.service. Feb 12 20:54:32.402966 sshd[4779]: Accepted publickey for core from 147.75.109.163 port 51134 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:32.401000 audit[4779]: USER_ACCT pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:32.403000 audit[4779]: CRED_ACQ pid=4779 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:32.403000 audit[4779]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5d83ec20 a2=3 a3=0 items=0 ppid=1 pid=4779 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:32.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:32.405868 sshd[4779]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:32.414939 systemd-logind[1131]: New session 19 of user core. Feb 12 20:54:32.415810 systemd[1]: Started session-19.scope. Feb 12 20:54:32.422000 audit[4779]: USER_START pid=4779 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:32.425000 audit[4781]: CRED_ACQ pid=4781 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:33.631165 sshd[4779]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:33.631000 audit[4779]: USER_END pid=4779 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:33.632000 audit[4779]: CRED_DISP pid=4779 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:33.636498 systemd-logind[1131]: Session 19 logged out. Waiting for processes to exit. Feb 12 20:54:33.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.39:22-147.75.109.163:51134 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:33.639135 systemd[1]: sshd@18-10.128.0.39:22-147.75.109.163:51134.service: Deactivated successfully. Feb 12 20:54:33.640399 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 20:54:33.645948 systemd-logind[1131]: Removed session 19. Feb 12 20:54:33.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.39:22-147.75.109.163:51150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:33.680319 systemd[1]: Started sshd@19-10.128.0.39:22-147.75.109.163:51150.service. Feb 12 20:54:33.858000 audit[4820]: NETFILTER_CFG table=filter:124 family=2 entries=6 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:33.858000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe2b983650 a2=0 a3=7ffe2b98363c items=0 ppid=2313 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:33.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:33.862000 audit[4820]: NETFILTER_CFG table=nat:125 family=2 entries=78 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:33.862000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe2b983650 a2=0 a3=7ffe2b98363c items=0 ppid=2313 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:33.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:33.956000 audit[4846]: NETFILTER_CFG table=filter:126 family=2 entries=18 op=nft_register_rule pid=4846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:33.956000 audit[4846]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffe7578b1b0 a2=0 a3=7ffe7578b19c items=0 ppid=2313 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:33.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:33.960000 audit[4846]: NETFILTER_CFG table=nat:127 family=2 entries=78 op=nft_register_rule pid=4846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:33.960000 audit[4846]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe7578b1b0 a2=0 a3=7ffe7578b19c items=0 ppid=2313 pid=4846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:33.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:33.987000 audit[4804]: USER_ACCT pid=4804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:33.990632 sshd[4804]: Accepted publickey for core from 147.75.109.163 port 51150 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:33.989000 audit[4804]: CRED_ACQ pid=4804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:33.989000 audit[4804]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6c07c960 a2=3 a3=0 items=0 ppid=1 pid=4804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:33.989000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:33.991630 sshd[4804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:33.998519 systemd-logind[1131]: New session 20 of user core. Feb 12 20:54:33.999271 systemd[1]: Started session-20.scope. Feb 12 20:54:34.008000 audit[4804]: USER_START pid=4804 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.011000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.503098 sshd[4804]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:34.503000 audit[4804]: USER_END pid=4804 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.504000 audit[4804]: CRED_DISP pid=4804 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.507365 systemd[1]: sshd@19-10.128.0.39:22-147.75.109.163:51150.service: Deactivated successfully. Feb 12 20:54:34.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.39:22-147.75.109.163:51150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:34.508620 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 20:54:34.509769 systemd-logind[1131]: Session 20 logged out. Waiting for processes to exit. Feb 12 20:54:34.511370 systemd-logind[1131]: Removed session 20. Feb 12 20:54:34.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.39:22-147.75.109.163:36502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:34.549649 systemd[1]: Started sshd@20-10.128.0.39:22-147.75.109.163:36502.service. Feb 12 20:54:34.843000 audit[4855]: USER_ACCT pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.845936 sshd[4855]: Accepted publickey for core from 147.75.109.163 port 36502 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:34.845000 audit[4855]: CRED_ACQ pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.845000 audit[4855]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc989e60e0 a2=3 a3=0 items=0 ppid=1 pid=4855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:34.845000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:34.848102 sshd[4855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:34.857078 systemd[1]: Started session-21.scope. Feb 12 20:54:34.859637 systemd-logind[1131]: New session 21 of user core. Feb 12 20:54:34.867000 audit[4855]: USER_START pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:34.870000 audit[4857]: CRED_ACQ pid=4857 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:35.134589 sshd[4855]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:35.136000 audit[4855]: USER_END pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:35.136000 audit[4855]: CRED_DISP pid=4855 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:35.139960 systemd[1]: sshd@20-10.128.0.39:22-147.75.109.163:36502.service: Deactivated successfully. Feb 12 20:54:35.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.39:22-147.75.109.163:36502 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:35.141271 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 20:54:35.142131 systemd-logind[1131]: Session 21 logged out. Waiting for processes to exit. Feb 12 20:54:35.143402 systemd-logind[1131]: Removed session 21. Feb 12 20:54:35.966000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:35.973615 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 20:54:35.973752 kernel: audit: type=1400 audit(1707771275.966:1455): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.006203 kernel: audit: type=1300 audit(1707771275.966:1455): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020efe00 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:35.966000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0020efe00 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:35.966000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:36.035258 kernel: audit: type=1327 audit(1707771275.966:1455): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:35.968000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.089770 kernel: audit: type=1400 audit(1707771275.968:1456): avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.089925 kernel: audit: type=1300 audit(1707771275.968:1456): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002145c80 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:35.968000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002145c80 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:35.968000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:36.154159 kernel: audit: type=1327 audit(1707771275.968:1456): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:36.456000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.486195 kernel: audit: type=1400 audit(1707771276.456:1457): avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.486337 kernel: audit: type=1300 audit(1707771276.456:1457): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c005112ed0 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.456000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c005112ed0 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.456000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:36.547463 kernel: audit: type=1327 audit(1707771276.456:1457): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:36.547668 kernel: audit: type=1400 audit(1707771276.457:1458): avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.457000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521268 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.457000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c005112f00 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:36.458000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.458000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c00c973a40 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:36.460000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521274 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.460000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c008a6e420 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.460000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:36.463000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.463000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0136ef820 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:36.464000 audit[1994]: AVC avc: denied { watch } for pid=1994 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:36.464000 audit[1994]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c008a6e450 a2=fc6 a3=0 items=0 ppid=1849 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c781 key=(null) Feb 12 20:54:36.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3339002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Feb 12 20:54:38.947000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:38.947000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022da9a0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:38.947000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:38.950000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:38.950000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002145fa0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:38.950000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:38.954000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:38.954000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00236a0c0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:38.954000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:38.959000 audit[1987]: AVC avc: denied { watch } for pid=1987 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:54:38.959000 audit[1987]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0022daac0 a2=fc6 a3=0 items=0 ppid=1809 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c647 key=(null) Feb 12 20:54:38.959000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:54:39.944000 audit[4891]: NETFILTER_CFG table=filter:128 family=2 entries=18 op=nft_register_rule pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:39.944000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcc4a56dd0 a2=0 a3=7ffcc4a56dbc items=0 ppid=2313 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:39.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:39.950000 audit[4891]: NETFILTER_CFG table=nat:129 family=2 entries=162 op=nft_register_chain pid=4891 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:39.950000 audit[4891]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffcc4a56dd0 a2=0 a3=7ffcc4a56dbc items=0 ppid=2313 pid=4891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:39.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:40.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.39:22-147.75.109.163:36514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:40.181794 systemd[1]: Started sshd@21-10.128.0.39:22-147.75.109.163:36514.service. Feb 12 20:54:40.475000 audit[4894]: USER_ACCT pid=4894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:40.478165 sshd[4894]: Accepted publickey for core from 147.75.109.163 port 36514 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:40.477000 audit[4894]: CRED_ACQ pid=4894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:40.477000 audit[4894]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc193a1cb0 a2=3 a3=0 items=0 ppid=1 pid=4894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:40.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:40.479133 sshd[4894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:40.486311 systemd[1]: Started session-22.scope. Feb 12 20:54:40.487313 systemd-logind[1131]: New session 22 of user core. Feb 12 20:54:40.497000 audit[4894]: USER_START pid=4894 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:40.500000 audit[4898]: CRED_ACQ pid=4898 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:40.762707 sshd[4894]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:40.764000 audit[4894]: USER_END pid=4894 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:40.764000 audit[4894]: CRED_DISP pid=4894 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:40.767585 systemd[1]: sshd@21-10.128.0.39:22-147.75.109.163:36514.service: Deactivated successfully. Feb 12 20:54:40.768901 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 20:54:40.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.39:22-147.75.109.163:36514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:40.769984 systemd-logind[1131]: Session 22 logged out. Waiting for processes to exit. Feb 12 20:54:40.771286 systemd-logind[1131]: Removed session 22. Feb 12 20:54:42.176643 systemd[1]: run-containerd-runc-k8s.io-27b5c3c0d5af7a9c5146dd5329b70483a73d69ac9ad06f5e5e0f82002a9d040e-runc.pcFZGG.mount: Deactivated successfully. Feb 12 20:54:42.733895 kubelet[2102]: I0212 20:54:42.733826 2102 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:54:42.742314 systemd[1]: Created slice kubepods-besteffort-podeaa091f8_b1c5_4e6d_ba1a_58e5fb6b3206.slice. Feb 12 20:54:42.821710 kubelet[2102]: I0212 20:54:42.821675 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206-calico-apiserver-certs\") pod \"calico-apiserver-7dfcdf7b64-fhgsg\" (UID: \"eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206\") " pod="calico-apiserver/calico-apiserver-7dfcdf7b64-fhgsg" Feb 12 20:54:42.822012 kubelet[2102]: I0212 20:54:42.821990 2102 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9n8bn\" (UniqueName: \"kubernetes.io/projected/eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206-kube-api-access-9n8bn\") pod \"calico-apiserver-7dfcdf7b64-fhgsg\" (UID: \"eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206\") " pod="calico-apiserver/calico-apiserver-7dfcdf7b64-fhgsg" Feb 12 20:54:42.905000 audit[4953]: NETFILTER_CFG table=filter:130 family=2 entries=7 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:42.911175 kernel: kauditd_printk_skb: 43 callbacks suppressed Feb 12 20:54:42.911311 kernel: audit: type=1325 audit(1707771282.905:1478): table=filter:130 family=2 entries=7 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:42.905000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd72bdd620 a2=0 a3=7ffd72bdd60c items=0 ppid=2313 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:42.960736 kernel: audit: type=1300 audit(1707771282.905:1478): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd72bdd620 a2=0 a3=7ffd72bdd60c items=0 ppid=2313 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:42.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:42.988914 kernel: audit: type=1327 audit(1707771282.905:1478): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:42.912000 audit[4953]: NETFILTER_CFG table=nat:131 family=2 entries=198 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:43.009355 kernel: audit: type=1325 audit(1707771282.912:1479): table=nat:131 family=2 entries=198 op=nft_register_rule pid=4953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:42.912000 audit[4953]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd72bdd620 a2=0 a3=7ffd72bdd60c items=0 ppid=2313 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.044172 kernel: audit: type=1300 audit(1707771282.912:1479): arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd72bdd620 a2=0 a3=7ffd72bdd60c items=0 ppid=2313 pid=4953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:42.912000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:43.065913 kernel: audit: type=1327 audit(1707771282.912:1479): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:43.066041 env[1145]: time="2024-02-12T20:54:43.065291856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfcdf7b64-fhgsg,Uid:eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:54:43.259000 audit[4998]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:43.277185 kernel: audit: type=1325 audit(1707771283.259:1480): table=filter:132 family=2 entries=8 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:43.259000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdc298bc70 a2=0 a3=7ffdc298bc5c items=0 ppid=2313 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.292906 systemd-networkd[1024]: calia47c19f79d8: Link UP Feb 12 20:54:43.317958 kernel: audit: type=1300 audit(1707771283.259:1480): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffdc298bc70 a2=0 a3=7ffdc298bc5c items=0 ppid=2313 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.318103 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:54:43.318266 kernel: audit: type=1327 audit(1707771283.259:1480): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:43.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:43.340659 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia47c19f79d8: link becomes ready Feb 12 20:54:43.341730 systemd-networkd[1024]: calia47c19f79d8: Gained carrier Feb 12 20:54:43.353000 audit[4998]: NETFILTER_CFG table=nat:133 family=2 entries=198 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:43.374178 kernel: audit: type=1325 audit(1707771283.353:1481): table=nat:133 family=2 entries=198 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.168 [INFO][4967] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0 calico-apiserver-7dfcdf7b64- calico-apiserver eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206 1116 0 2024-02-12 20:54:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dfcdf7b64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal calico-apiserver-7dfcdf7b64-fhgsg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia47c19f79d8 [] []}} ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.169 [INFO][4967] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.226 [INFO][4989] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" HandleID="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.241 [INFO][4989] ipam_plugin.go 268: Auto assigning IP ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" HandleID="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000118a60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", "pod":"calico-apiserver-7dfcdf7b64-fhgsg", "timestamp":"2024-02-12 20:54:43.226384201 +0000 UTC"}, Hostname:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.242 [INFO][4989] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.242 [INFO][4989] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.242 [INFO][4989] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal' Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.244 [INFO][4989] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.250 [INFO][4989] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.256 [INFO][4989] ipam.go 489: Trying affinity for 192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.258 [INFO][4989] ipam.go 155: Attempting to load block cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.264 [INFO][4989] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.20.0/26 host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.264 [INFO][4989] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.20.0/26 handle="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.269 [INFO][4989] ipam.go 1682: Creating new handle: k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986 Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.274 [INFO][4989] ipam.go 1203: Writing block in order to claim IPs block=192.168.20.0/26 handle="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.283 [INFO][4989] ipam.go 1216: Successfully claimed IPs: [192.168.20.5/26] block=192.168.20.0/26 handle="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.283 [INFO][4989] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.20.5/26] handle="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" host="ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal" Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.283 [INFO][4989] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:54:43.380712 env[1145]: 2024-02-12 20:54:43.283 [INFO][4989] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.20.5/26] IPv6=[] ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" HandleID="k8s-pod-network.c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Workload="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.382240 env[1145]: 2024-02-12 20:54:43.288 [INFO][4967] k8s.go 385: Populated endpoint ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0", GenerateName:"calico-apiserver-7dfcdf7b64-", Namespace:"calico-apiserver", SelfLink:"", UID:"eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206", ResourceVersion:"1116", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 54, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfcdf7b64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-7dfcdf7b64-fhgsg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia47c19f79d8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:54:43.382240 env[1145]: 2024-02-12 20:54:43.288 [INFO][4967] k8s.go 386: Calico CNI using IPs: [192.168.20.5/32] ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.382240 env[1145]: 2024-02-12 20:54:43.289 [INFO][4967] dataplane_linux.go 68: Setting the host side veth name to calia47c19f79d8 ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.382240 env[1145]: 2024-02-12 20:54:43.344 [INFO][4967] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.382240 env[1145]: 2024-02-12 20:54:43.357 [INFO][4967] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0", GenerateName:"calico-apiserver-7dfcdf7b64-", Namespace:"calico-apiserver", SelfLink:"", UID:"eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206", ResourceVersion:"1116", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 54, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfcdf7b64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-4b49ef5e8117c3640c10.c.flatcar-212911.internal", ContainerID:"c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986", Pod:"calico-apiserver-7dfcdf7b64-fhgsg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.20.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia47c19f79d8", MAC:"7e:18:ba:a2:bd:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:54:43.382240 env[1145]: 2024-02-12 20:54:43.371 [INFO][4967] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986" Namespace="calico-apiserver" Pod="calico-apiserver-7dfcdf7b64-fhgsg" WorkloadEndpoint="ci--3510--3--2--4b49ef5e8117c3640c10.c.flatcar--212911.internal-k8s-calico--apiserver--7dfcdf7b64--fhgsg-eth0" Feb 12 20:54:43.353000 audit[4998]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffdc298bc70 a2=0 a3=7ffdc298bc5c items=0 ppid=2313 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:43.420075 env[1145]: time="2024-02-12T20:54:43.419971508Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:54:43.420505 env[1145]: time="2024-02-12T20:54:43.420443983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:54:43.420719 env[1145]: time="2024-02-12T20:54:43.420677849Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:54:43.421173 env[1145]: time="2024-02-12T20:54:43.421072237Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986 pid=5021 runtime=io.containerd.runc.v2 Feb 12 20:54:43.492236 systemd[1]: Started cri-containerd-c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986.scope. Feb 12 20:54:43.495000 audit[5040]: NETFILTER_CFG table=filter:134 family=2 entries=59 op=nft_register_chain pid=5040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:54:43.495000 audit[5040]: SYSCALL arch=c000003e syscall=46 success=yes exit=29292 a0=3 a1=7fff9eeab4a0 a2=0 a3=7fff9eeab48c items=0 ppid=3639 pid=5040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.495000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.514000 audit: BPF prog-id=189 op=LOAD Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5021 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623939373838306334383035336331346538336435363562303061 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5021 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623939373838306334383035336331346538336435363562303061 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit: BPF prog-id=190 op=LOAD Feb 12 20:54:43.515000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000397600 items=0 ppid=5021 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623939373838306334383035336331346538336435363562303061 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit: BPF prog-id=191 op=LOAD Feb 12 20:54:43.515000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000397648 items=0 ppid=5021 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623939373838306334383035336331346538336435363562303061 Feb 12 20:54:43.515000 audit: BPF prog-id=191 op=UNLOAD Feb 12 20:54:43.515000 audit: BPF prog-id=190 op=UNLOAD Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:43.515000 audit: BPF prog-id=192 op=LOAD Feb 12 20:54:43.515000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000397a58 items=0 ppid=5021 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:43.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338623939373838306334383035336331346538336435363562303061 Feb 12 20:54:43.566140 env[1145]: time="2024-02-12T20:54:43.565982237Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfcdf7b64-fhgsg,Uid:eaa091f8-b1c5-4e6d-ba1a-58e5fb6b3206,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986\"" Feb 12 20:54:43.578105 kubelet[2102]: E0212 20:54:43.577445 2102 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 12 20:54:43.578407 env[1145]: time="2024-02-12T20:54:43.577849463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:54:44.668239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount732709761.mount: Deactivated successfully. Feb 12 20:54:44.670986 systemd-networkd[1024]: calia47c19f79d8: Gained IPv6LL Feb 12 20:54:45.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.39:22-147.75.109.163:56880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:45.810140 systemd[1]: Started sshd@22-10.128.0.39:22-147.75.109.163:56880.service. Feb 12 20:54:46.117000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:46.120768 sshd[5062]: Accepted publickey for core from 147.75.109.163 port 56880 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:46.120000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:46.120000 audit[5062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9e791c30 a2=3 a3=0 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:46.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:46.123208 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:46.132179 systemd[1]: Started session-23.scope. Feb 12 20:54:46.134941 systemd-logind[1131]: New session 23 of user core. Feb 12 20:54:46.142000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:46.144000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:46.489450 sshd[5062]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:46.489000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:46.489000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:46.496403 systemd-logind[1131]: Session 23 logged out. Waiting for processes to exit. Feb 12 20:54:46.498443 systemd[1]: sshd@22-10.128.0.39:22-147.75.109.163:56880.service: Deactivated successfully. Feb 12 20:54:46.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.39:22-147.75.109.163:56880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:46.499651 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 20:54:46.501869 systemd-logind[1131]: Removed session 23. Feb 12 20:54:46.816439 env[1145]: time="2024-02-12T20:54:46.815436800Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:54:46.819618 env[1145]: time="2024-02-12T20:54:46.819561065Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:54:46.822434 env[1145]: time="2024-02-12T20:54:46.822388666Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:54:46.825121 env[1145]: time="2024-02-12T20:54:46.825076682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:54:46.826176 env[1145]: time="2024-02-12T20:54:46.826107276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:54:46.840568 env[1145]: time="2024-02-12T20:54:46.840516583Z" level=info msg="CreateContainer within sandbox \"c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:54:46.859704 env[1145]: time="2024-02-12T20:54:46.859650145Z" level=info msg="CreateContainer within sandbox \"c8b997880c48053c14e83d565b00af35ed7a3204564401f29c3d61221d0ad986\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"07f6713363d6cd7abbfa4aa91215b5e765e5b85a1221b6de0f26808774367593\"" Feb 12 20:54:46.864660 env[1145]: time="2024-02-12T20:54:46.864616697Z" level=info msg="StartContainer for \"07f6713363d6cd7abbfa4aa91215b5e765e5b85a1221b6de0f26808774367593\"" Feb 12 20:54:46.906416 systemd[1]: Started cri-containerd-07f6713363d6cd7abbfa4aa91215b5e765e5b85a1221b6de0f26808774367593.scope. Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.929000 audit: BPF prog-id=193 op=LOAD Feb 12 20:54:46.932000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.932000 audit[5082]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5021 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:46.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663637313333363364366364376162626661346161393132313562 Feb 12 20:54:46.932000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.932000 audit[5082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5021 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:46.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663637313333363364366364376162626661346161393132313562 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.934000 audit: BPF prog-id=194 op=LOAD Feb 12 20:54:46.934000 audit[5082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028a540 items=0 ppid=5021 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:46.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663637313333363364366364376162626661346161393132313562 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit: BPF prog-id=195 op=LOAD Feb 12 20:54:46.935000 audit[5082]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028a588 items=0 ppid=5021 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:46.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663637313333363364366364376162626661346161393132313562 Feb 12 20:54:46.935000 audit: BPF prog-id=195 op=UNLOAD Feb 12 20:54:46.935000 audit: BPF prog-id=194 op=UNLOAD Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { perfmon } for pid=5082 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit[5082]: AVC avc: denied { bpf } for pid=5082 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:54:46.935000 audit: BPF prog-id=196 op=LOAD Feb 12 20:54:46.935000 audit[5082]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028a998 items=0 ppid=5021 pid=5082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:46.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037663637313333363364366364376162626661346161393132313562 Feb 12 20:54:47.003297 env[1145]: time="2024-02-12T20:54:47.003239335Z" level=info msg="StartContainer for \"07f6713363d6cd7abbfa4aa91215b5e765e5b85a1221b6de0f26808774367593\" returns successfully" Feb 12 20:54:47.742000 audit[5093]: AVC avc: denied { watch } for pid=5093 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_54_42.2678676217/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c7,c224 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c7,c224 tclass=file permissive=0 Feb 12 20:54:47.742000 audit[5093]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a530c0 a2=fc6 a3=0 items=0 ppid=5021 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c7,c224 key=(null) Feb 12 20:54:47.742000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:54:47.866913 kubelet[2102]: I0212 20:54:47.866748 2102 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7dfcdf7b64-fhgsg" podStartSLOduration=-9.22337203098808e+09 pod.CreationTimestamp="2024-02-12 20:54:42 +0000 UTC" firstStartedPulling="2024-02-12 20:54:43.57255446 +0000 UTC m=+123.634826042" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:54:47.864256021 +0000 UTC m=+127.926527625" watchObservedRunningTime="2024-02-12 20:54:47.866696312 +0000 UTC m=+127.928967915" Feb 12 20:54:47.935000 audit[5137]: NETFILTER_CFG table=filter:135 family=2 entries=8 op=nft_register_rule pid=5137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:47.942389 kernel: kauditd_printk_skb: 133 callbacks suppressed Feb 12 20:54:47.942524 kernel: audit: type=1325 audit(1707771287.935:1529): table=filter:135 family=2 entries=8 op=nft_register_rule pid=5137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:47.935000 audit[5137]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd01aff4d0 a2=0 a3=7ffd01aff4bc items=0 ppid=2313 pid=5137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:47.992074 kernel: audit: type=1300 audit(1707771287.935:1529): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffd01aff4d0 a2=0 a3=7ffd01aff4bc items=0 ppid=2313 pid=5137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:47.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:48.013824 kernel: audit: type=1327 audit(1707771287.935:1529): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:48.013993 kernel: audit: type=1325 audit(1707771287.942:1530): table=nat:136 family=2 entries=198 op=nft_register_rule pid=5137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:47.942000 audit[5137]: NETFILTER_CFG table=nat:136 family=2 entries=198 op=nft_register_rule pid=5137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:47.942000 audit[5137]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd01aff4d0 a2=0 a3=7ffd01aff4bc items=0 ppid=2313 pid=5137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:48.025616 kernel: audit: type=1300 audit(1707771287.942:1530): arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffd01aff4d0 a2=0 a3=7ffd01aff4bc items=0 ppid=2313 pid=5137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:47.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:48.059607 kernel: audit: type=1327 audit(1707771287.942:1530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:48.969000 audit[5165]: NETFILTER_CFG table=filter:137 family=2 entries=8 op=nft_register_rule pid=5165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:48.969000 audit[5165]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcab461960 a2=0 a3=7ffcab46194c items=0 ppid=2313 pid=5165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:49.020121 kernel: audit: type=1325 audit(1707771288.969:1531): table=filter:137 family=2 entries=8 op=nft_register_rule pid=5165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:49.020307 kernel: audit: type=1300 audit(1707771288.969:1531): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffcab461960 a2=0 a3=7ffcab46194c items=0 ppid=2313 pid=5165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:48.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:49.036180 kernel: audit: type=1327 audit(1707771288.969:1531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:48.974000 audit[5165]: NETFILTER_CFG table=nat:138 family=2 entries=198 op=nft_register_rule pid=5165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:48.974000 audit[5165]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffcab461960 a2=0 a3=7ffcab46194c items=0 ppid=2313 pid=5165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:48.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:54:49.053221 kernel: audit: type=1325 audit(1707771288.974:1532): table=nat:138 family=2 entries=198 op=nft_register_rule pid=5165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:54:51.538367 systemd[1]: Started sshd@23-10.128.0.39:22-147.75.109.163:56894.service. Feb 12 20:54:51.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.39:22-147.75.109.163:56894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:51.828000 audit[5173]: USER_ACCT pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:51.829580 sshd[5173]: Accepted publickey for core from 147.75.109.163 port 56894 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:51.829000 audit[5173]: CRED_ACQ pid=5173 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:51.830000 audit[5173]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffde976a40 a2=3 a3=0 items=0 ppid=1 pid=5173 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:51.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:51.831720 sshd[5173]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:51.838253 systemd-logind[1131]: New session 24 of user core. Feb 12 20:54:51.839518 systemd[1]: Started session-24.scope. Feb 12 20:54:51.846000 audit[5173]: USER_START pid=5173 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:51.848000 audit[5175]: CRED_ACQ pid=5175 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:52.113936 sshd[5173]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:52.114000 audit[5173]: USER_END pid=5173 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:52.115000 audit[5173]: CRED_DISP pid=5173 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:52.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.39:22-147.75.109.163:56894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:52.119302 systemd-logind[1131]: Session 24 logged out. Waiting for processes to exit. Feb 12 20:54:52.119582 systemd[1]: sshd@23-10.128.0.39:22-147.75.109.163:56894.service: Deactivated successfully. Feb 12 20:54:52.120635 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 20:54:52.123099 systemd-logind[1131]: Removed session 24. Feb 12 20:54:54.897399 systemd[1]: run-containerd-runc-k8s.io-9700dc882e92f364e6835b453086b3f9b66b114239535c49fee1698708eb78a3-runc.oqkoWu.mount: Deactivated successfully. Feb 12 20:54:57.190990 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 20:54:57.191287 kernel: audit: type=1130 audit(1707771297.159:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.39:22-147.75.109.163:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:57.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.39:22-147.75.109.163:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:54:57.160701 systemd[1]: Started sshd@24-10.128.0.39:22-147.75.109.163:45412.service. Feb 12 20:54:57.450000 audit[5212]: USER_ACCT pid=5212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.481972 sshd[5212]: Accepted publickey for core from 147.75.109.163 port 45412 ssh2: RSA SHA256:q9FDJmXDrtsTmlclKJSgctkPqdZIPCU8+TTOU9T+Jts Feb 12 20:54:57.482416 kernel: audit: type=1101 audit(1707771297.450:1543): pid=5212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.483501 sshd[5212]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:54:57.512176 kernel: audit: type=1103 audit(1707771297.481:1544): pid=5212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.481000 audit[5212]: CRED_ACQ pid=5212 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.496060 systemd[1]: Started session-25.scope. Feb 12 20:54:57.498316 systemd-logind[1131]: New session 25 of user core. Feb 12 20:54:57.481000 audit[5212]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7a406440 a2=3 a3=0 items=0 ppid=1 pid=5212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:57.557680 kernel: audit: type=1006 audit(1707771297.481:1545): pid=5212 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 20:54:57.557840 kernel: audit: type=1300 audit(1707771297.481:1545): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7a406440 a2=3 a3=0 items=0 ppid=1 pid=5212 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:54:57.481000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:57.567289 kernel: audit: type=1327 audit(1707771297.481:1545): proctitle=737368643A20636F7265205B707269765D Feb 12 20:54:57.567427 kernel: audit: type=1105 audit(1707771297.517:1546): pid=5212 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.517000 audit[5212]: USER_START pid=5212 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.528000 audit[5214]: CRED_ACQ pid=5214 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.623982 kernel: audit: type=1103 audit(1707771297.528:1547): pid=5214 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.768083 sshd[5212]: pam_unix(sshd:session): session closed for user core Feb 12 20:54:57.768000 audit[5212]: USER_END pid=5212 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.775260 systemd[1]: sshd@24-10.128.0.39:22-147.75.109.163:45412.service: Deactivated successfully. Feb 12 20:54:57.776468 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 20:54:57.778242 systemd-logind[1131]: Session 25 logged out. Waiting for processes to exit. Feb 12 20:54:57.779823 systemd-logind[1131]: Removed session 25. Feb 12 20:54:57.768000 audit[5212]: CRED_DISP pid=5212 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.803229 kernel: audit: type=1106 audit(1707771297.768:1548): pid=5212 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.803318 kernel: audit: type=1104 audit(1707771297.768:1549): pid=5212 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 12 20:54:57.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.39:22-147.75.109.163:45412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'