Feb 12 20:37:26.943836 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:37:26.943882 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:37:26.943910 kernel: BIOS-provided physical RAM map: Feb 12 20:37:26.943928 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 20:37:26.943945 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 20:37:26.943962 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 20:37:26.943981 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Feb 12 20:37:26.943998 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Feb 12 20:37:26.944018 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 20:37:26.944034 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 20:37:26.944050 kernel: NX (Execute Disable) protection: active Feb 12 20:37:26.944066 kernel: SMBIOS 2.8 present. Feb 12 20:37:26.944083 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 12 20:37:26.944099 kernel: Hypervisor detected: KVM Feb 12 20:37:26.944119 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:37:26.944141 kernel: kvm-clock: cpu 0, msr 2ffaa001, primary cpu clock Feb 12 20:37:26.944159 kernel: kvm-clock: using sched offset of 4873364702 cycles Feb 12 20:37:26.944178 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:37:26.944197 kernel: tsc: Detected 1996.249 MHz processor Feb 12 20:37:26.944215 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:37:26.944235 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:37:26.944633 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Feb 12 20:37:26.944654 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:37:26.944682 kernel: ACPI: Early table checksum verification disabled Feb 12 20:37:26.944700 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Feb 12 20:37:26.944719 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:37:26.944737 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:37:26.944756 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:37:26.944774 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 12 20:37:26.944792 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:37:26.944810 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:37:26.944828 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Feb 12 20:37:26.944851 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Feb 12 20:37:26.944869 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 12 20:37:26.944887 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Feb 12 20:37:26.944905 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Feb 12 20:37:26.944924 kernel: No NUMA configuration found Feb 12 20:37:26.944942 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Feb 12 20:37:26.944960 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Feb 12 20:37:26.944979 kernel: Zone ranges: Feb 12 20:37:26.945008 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:37:26.945027 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Feb 12 20:37:26.945046 kernel: Normal empty Feb 12 20:37:26.945065 kernel: Movable zone start for each node Feb 12 20:37:26.945084 kernel: Early memory node ranges Feb 12 20:37:26.945101 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 20:37:26.945117 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Feb 12 20:37:26.945131 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Feb 12 20:37:26.945145 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:37:26.945160 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 20:37:26.945174 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Feb 12 20:37:26.945188 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 20:37:26.945202 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:37:26.945217 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:37:26.945231 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 20:37:26.945248 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:37:26.945262 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:37:26.945276 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:37:26.945291 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:37:26.945305 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:37:26.945319 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 20:37:26.945333 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 12 20:37:26.945347 kernel: Booting paravirtualized kernel on KVM Feb 12 20:37:26.945362 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:37:26.945376 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 20:37:26.950449 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 20:37:26.950471 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 20:37:26.950485 kernel: pcpu-alloc: [0] 0 1 Feb 12 20:37:26.950500 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 12 20:37:26.950515 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 12 20:37:26.950529 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Feb 12 20:37:26.950543 kernel: Policy zone: DMA32 Feb 12 20:37:26.950561 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:37:26.950584 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:37:26.950598 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 20:37:26.950613 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 20:37:26.950628 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:37:26.950643 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 12 20:37:26.950657 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 20:37:26.950672 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:37:26.950686 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:37:26.950704 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:37:26.950719 kernel: rcu: RCU event tracing is enabled. Feb 12 20:37:26.950734 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 20:37:26.950749 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:37:26.950763 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:37:26.950778 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:37:26.950793 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 20:37:26.950807 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 20:37:26.950821 kernel: Console: colour VGA+ 80x25 Feb 12 20:37:26.950839 kernel: printk: console [tty0] enabled Feb 12 20:37:26.950853 kernel: printk: console [ttyS0] enabled Feb 12 20:37:26.950868 kernel: ACPI: Core revision 20210730 Feb 12 20:37:26.950882 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:37:26.950896 kernel: x2apic enabled Feb 12 20:37:26.950910 kernel: Switched APIC routing to physical x2apic. Feb 12 20:37:26.950925 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 20:37:26.950939 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 20:37:26.950954 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Feb 12 20:37:26.950968 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 12 20:37:26.950986 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 12 20:37:26.951000 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:37:26.951015 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 20:37:26.951030 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:37:26.951044 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:37:26.951058 kernel: Speculative Store Bypass: Vulnerable Feb 12 20:37:26.951073 kernel: x86/fpu: x87 FPU will use FXSAVE Feb 12 20:37:26.951087 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:37:26.951101 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:37:26.951118 kernel: LSM: Security Framework initializing Feb 12 20:37:26.951132 kernel: SELinux: Initializing. Feb 12 20:37:26.951146 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 20:37:26.951161 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 20:37:26.951176 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Feb 12 20:37:26.951190 kernel: Performance Events: AMD PMU driver. Feb 12 20:37:26.951204 kernel: ... version: 0 Feb 12 20:37:26.951219 kernel: ... bit width: 48 Feb 12 20:37:26.951233 kernel: ... generic registers: 4 Feb 12 20:37:26.951259 kernel: ... value mask: 0000ffffffffffff Feb 12 20:37:26.951274 kernel: ... max period: 00007fffffffffff Feb 12 20:37:26.951292 kernel: ... fixed-purpose events: 0 Feb 12 20:37:26.951307 kernel: ... event mask: 000000000000000f Feb 12 20:37:26.951322 kernel: signal: max sigframe size: 1440 Feb 12 20:37:26.951336 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:37:26.951351 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:37:26.951366 kernel: x86: Booting SMP configuration: Feb 12 20:37:26.951411 kernel: .... node #0, CPUs: #1 Feb 12 20:37:26.951428 kernel: kvm-clock: cpu 1, msr 2ffaa041, secondary cpu clock Feb 12 20:37:26.951444 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 12 20:37:26.951459 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 20:37:26.951473 kernel: smpboot: Max logical packages: 2 Feb 12 20:37:26.951489 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Feb 12 20:37:26.951504 kernel: devtmpfs: initialized Feb 12 20:37:26.951519 kernel: x86/mm: Memory block size: 128MB Feb 12 20:37:26.951534 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:37:26.951554 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 20:37:26.951569 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:37:26.951584 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:37:26.951599 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:37:26.951615 kernel: audit: type=2000 audit(1707770246.444:1): state=initialized audit_enabled=0 res=1 Feb 12 20:37:26.951630 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:37:26.951645 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:37:26.951660 kernel: cpuidle: using governor menu Feb 12 20:37:26.951674 kernel: ACPI: bus type PCI registered Feb 12 20:37:26.951692 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:37:26.951707 kernel: dca service started, version 1.12.1 Feb 12 20:37:26.951722 kernel: PCI: Using configuration type 1 for base access Feb 12 20:37:26.951737 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:37:26.951753 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:37:26.951767 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:37:26.951782 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:37:26.951797 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:37:26.951812 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:37:26.951830 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:37:26.951845 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:37:26.951860 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:37:26.951875 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 20:37:26.951890 kernel: ACPI: Interpreter enabled Feb 12 20:37:26.951904 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:37:26.951919 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:37:26.951935 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:37:26.951949 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 20:37:26.951968 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:37:26.952223 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:37:26.954430 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 20:37:26.954447 kernel: acpiphp: Slot [3] registered Feb 12 20:37:26.954455 kernel: acpiphp: Slot [4] registered Feb 12 20:37:26.954463 kernel: acpiphp: Slot [5] registered Feb 12 20:37:26.954471 kernel: acpiphp: Slot [6] registered Feb 12 20:37:26.954482 kernel: acpiphp: Slot [7] registered Feb 12 20:37:26.954490 kernel: acpiphp: Slot [8] registered Feb 12 20:37:26.954498 kernel: acpiphp: Slot [9] registered Feb 12 20:37:26.954506 kernel: acpiphp: Slot [10] registered Feb 12 20:37:26.954514 kernel: acpiphp: Slot [11] registered Feb 12 20:37:26.954522 kernel: acpiphp: Slot [12] registered Feb 12 20:37:26.954530 kernel: acpiphp: Slot [13] registered Feb 12 20:37:26.954537 kernel: acpiphp: Slot [14] registered Feb 12 20:37:26.954545 kernel: acpiphp: Slot [15] registered Feb 12 20:37:26.954553 kernel: acpiphp: Slot [16] registered Feb 12 20:37:26.954563 kernel: acpiphp: Slot [17] registered Feb 12 20:37:26.954570 kernel: acpiphp: Slot [18] registered Feb 12 20:37:26.954578 kernel: acpiphp: Slot [19] registered Feb 12 20:37:26.954586 kernel: acpiphp: Slot [20] registered Feb 12 20:37:26.954594 kernel: acpiphp: Slot [21] registered Feb 12 20:37:26.954602 kernel: acpiphp: Slot [22] registered Feb 12 20:37:26.954610 kernel: acpiphp: Slot [23] registered Feb 12 20:37:26.954618 kernel: acpiphp: Slot [24] registered Feb 12 20:37:26.954625 kernel: acpiphp: Slot [25] registered Feb 12 20:37:26.954634 kernel: acpiphp: Slot [26] registered Feb 12 20:37:26.954642 kernel: acpiphp: Slot [27] registered Feb 12 20:37:26.954650 kernel: acpiphp: Slot [28] registered Feb 12 20:37:26.954658 kernel: acpiphp: Slot [29] registered Feb 12 20:37:26.954667 kernel: acpiphp: Slot [30] registered Feb 12 20:37:26.954675 kernel: acpiphp: Slot [31] registered Feb 12 20:37:26.954682 kernel: PCI host bridge to bus 0000:00 Feb 12 20:37:26.954780 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:37:26.954857 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:37:26.954934 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:37:26.955005 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 20:37:26.955076 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 20:37:26.955146 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:37:26.955239 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:37:26.955329 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 20:37:26.955451 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 20:37:26.955535 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Feb 12 20:37:26.955617 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 20:37:26.955697 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 20:37:26.955778 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 20:37:26.955859 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 20:37:26.955947 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:37:26.956034 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 20:37:26.956123 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 20:37:26.956231 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 12 20:37:26.956330 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 12 20:37:26.956441 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 12 20:37:26.956539 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 12 20:37:26.956642 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 12 20:37:26.956731 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 20:37:26.956828 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:37:26.956919 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 12 20:37:26.957008 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 12 20:37:26.957096 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 12 20:37:26.957183 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 12 20:37:26.957280 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 20:37:26.957369 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 20:37:26.957478 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 12 20:37:26.957568 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 12 20:37:26.957671 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 12 20:37:26.957763 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 12 20:37:26.957851 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 12 20:37:26.957950 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:37:26.958038 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Feb 12 20:37:26.958126 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 12 20:37:26.958139 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:37:26.958148 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:37:26.958157 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:37:26.958166 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:37:26.958175 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:37:26.958189 kernel: iommu: Default domain type: Translated Feb 12 20:37:26.958197 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:37:26.958277 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 20:37:26.958359 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 20:37:26.962495 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 20:37:26.962511 kernel: vgaarb: loaded Feb 12 20:37:26.962520 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:37:26.962529 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:37:26.962537 kernel: PTP clock support registered Feb 12 20:37:26.962548 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:37:26.962557 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:37:26.962565 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 20:37:26.962573 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Feb 12 20:37:26.962581 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:37:26.962589 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:37:26.962597 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:37:26.962605 kernel: pnp: PnP ACPI init Feb 12 20:37:26.962691 kernel: pnp 00:03: [dma 2] Feb 12 20:37:26.962707 kernel: pnp: PnP ACPI: found 5 devices Feb 12 20:37:26.962716 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:37:26.962724 kernel: NET: Registered PF_INET protocol family Feb 12 20:37:26.962732 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 20:37:26.962741 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 20:37:26.962749 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:37:26.962757 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:37:26.962765 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 20:37:26.962775 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 20:37:26.962783 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 20:37:26.962791 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 20:37:26.962799 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:37:26.962807 kernel: NET: Registered PF_XDP protocol family Feb 12 20:37:26.962882 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:37:26.962957 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:37:26.963030 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:37:26.963101 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 20:37:26.963176 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 20:37:26.963259 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 20:37:26.963342 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:37:26.963442 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 20:37:26.963454 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:37:26.963462 kernel: Initialise system trusted keyrings Feb 12 20:37:26.963471 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 20:37:26.963482 kernel: Key type asymmetric registered Feb 12 20:37:26.963490 kernel: Asymmetric key parser 'x509' registered Feb 12 20:37:26.963498 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:37:26.963506 kernel: io scheduler mq-deadline registered Feb 12 20:37:26.963514 kernel: io scheduler kyber registered Feb 12 20:37:26.963522 kernel: io scheduler bfq registered Feb 12 20:37:26.963530 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:37:26.963539 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 12 20:37:26.963547 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:37:26.963555 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 20:37:26.963565 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:37:26.963573 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:37:26.963581 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:37:26.963589 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:37:26.963597 kernel: random: crng init done Feb 12 20:37:26.963605 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:37:26.963613 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:37:26.963621 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:37:26.963729 kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 12 20:37:26.963811 kernel: rtc_cmos 00:04: registered as rtc0 Feb 12 20:37:26.963885 kernel: rtc_cmos 00:04: setting system clock to 2024-02-12T20:37:26 UTC (1707770246) Feb 12 20:37:26.963959 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 12 20:37:26.963970 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:37:26.963978 kernel: Segment Routing with IPv6 Feb 12 20:37:26.963986 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:37:26.963994 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:37:26.964002 kernel: Key type dns_resolver registered Feb 12 20:37:26.964013 kernel: IPI shorthand broadcast: enabled Feb 12 20:37:26.964021 kernel: sched_clock: Marking stable (725074115, 116991605)->(905597578, -63531858) Feb 12 20:37:26.964029 kernel: registered taskstats version 1 Feb 12 20:37:26.964037 kernel: Loading compiled-in X.509 certificates Feb 12 20:37:26.964045 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:37:26.964053 kernel: Key type .fscrypt registered Feb 12 20:37:26.964061 kernel: Key type fscrypt-provisioning registered Feb 12 20:37:26.964069 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 20:37:26.964079 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:37:26.964087 kernel: ima: No architecture policies found Feb 12 20:37:26.964095 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:37:26.964103 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:37:26.964111 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:37:26.964119 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:37:26.964127 kernel: Run /init as init process Feb 12 20:37:26.964135 kernel: with arguments: Feb 12 20:37:26.964143 kernel: /init Feb 12 20:37:26.964152 kernel: with environment: Feb 12 20:37:26.964160 kernel: HOME=/ Feb 12 20:37:26.964167 kernel: TERM=linux Feb 12 20:37:26.964175 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:37:26.964186 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:37:26.964196 systemd[1]: Detected virtualization kvm. Feb 12 20:37:26.964205 systemd[1]: Detected architecture x86-64. Feb 12 20:37:26.964214 systemd[1]: Running in initrd. Feb 12 20:37:26.964224 systemd[1]: No hostname configured, using default hostname. Feb 12 20:37:26.964232 systemd[1]: Hostname set to . Feb 12 20:37:26.964251 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:37:26.964260 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:37:26.964268 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:37:26.964277 systemd[1]: Reached target cryptsetup.target. Feb 12 20:37:26.964285 systemd[1]: Reached target paths.target. Feb 12 20:37:26.964294 systemd[1]: Reached target slices.target. Feb 12 20:37:26.964304 systemd[1]: Reached target swap.target. Feb 12 20:37:26.964312 systemd[1]: Reached target timers.target. Feb 12 20:37:26.964321 systemd[1]: Listening on iscsid.socket. Feb 12 20:37:26.964330 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:37:26.964338 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:37:26.964347 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:37:26.964355 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:37:26.964364 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:37:26.964374 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:37:26.965522 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:37:26.965541 systemd[1]: Reached target sockets.target. Feb 12 20:37:26.965550 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:37:26.965575 systemd[1]: Finished network-cleanup.service. Feb 12 20:37:26.965589 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:37:26.965600 systemd[1]: Starting systemd-journald.service... Feb 12 20:37:26.965609 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:37:26.965618 systemd[1]: Starting systemd-resolved.service... Feb 12 20:37:26.965627 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:37:26.965636 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:37:26.965647 systemd-journald[184]: Journal started Feb 12 20:37:26.965717 systemd-journald[184]: Runtime Journal (/run/log/journal/b705ec3778174671bba08740b9fa3a63) is 4.9M, max 39.5M, 34.5M free. Feb 12 20:37:26.928983 systemd-modules-load[185]: Inserted module 'overlay' Feb 12 20:37:26.989452 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:37:26.989475 kernel: Bridge firewalling registered Feb 12 20:37:26.976780 systemd-resolved[186]: Positive Trust Anchors: Feb 12 20:37:26.995242 systemd[1]: Started systemd-journald.service. Feb 12 20:37:26.995263 kernel: audit: type=1130 audit(1707770246.989:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.976796 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:37:26.999729 kernel: audit: type=1130 audit(1707770246.995:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.976832 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:37:27.005526 kernel: audit: type=1130 audit(1707770246.999:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.979500 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 12 20:37:27.009503 kernel: audit: type=1130 audit(1707770247.005:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.982071 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 12 20:37:27.014450 kernel: audit: type=1130 audit(1707770247.009:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.014465 kernel: SCSI subsystem initialized Feb 12 20:37:27.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:26.996201 systemd[1]: Started systemd-resolved.service. Feb 12 20:37:27.000363 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:37:27.006098 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:37:27.010071 systemd[1]: Reached target nss-lookup.target. Feb 12 20:37:27.015600 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:37:27.017002 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:37:27.022526 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:37:27.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.028404 kernel: audit: type=1130 audit(1707770247.022:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.037407 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:37:27.037442 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:37:27.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.037654 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:37:27.041794 kernel: audit: type=1130 audit(1707770247.037:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.042045 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:37:27.045405 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:37:27.047877 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 12 20:37:27.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.048968 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:37:27.053248 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:37:27.053755 kernel: audit: type=1130 audit(1707770247.049:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.058441 dracut-cmdline[201]: dracut-dracut-053 Feb 12 20:37:27.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.060144 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:37:27.064085 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:37:27.066043 kernel: audit: type=1130 audit(1707770247.060:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.119451 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:37:27.133431 kernel: iscsi: registered transport (tcp) Feb 12 20:37:27.156870 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:37:27.156914 kernel: QLogic iSCSI HBA Driver Feb 12 20:37:27.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.203795 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:37:27.205316 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:37:27.288651 kernel: raid6: sse2x4 gen() 10568 MB/s Feb 12 20:37:27.305504 kernel: raid6: sse2x4 xor() 7094 MB/s Feb 12 20:37:27.322507 kernel: raid6: sse2x2 gen() 13434 MB/s Feb 12 20:37:27.339582 kernel: raid6: sse2x2 xor() 8563 MB/s Feb 12 20:37:27.356452 kernel: raid6: sse2x1 gen() 11245 MB/s Feb 12 20:37:27.374112 kernel: raid6: sse2x1 xor() 6993 MB/s Feb 12 20:37:27.374178 kernel: raid6: using algorithm sse2x2 gen() 13434 MB/s Feb 12 20:37:27.374210 kernel: raid6: .... xor() 8563 MB/s, rmw enabled Feb 12 20:37:27.374903 kernel: raid6: using ssse3x2 recovery algorithm Feb 12 20:37:27.391130 kernel: xor: measuring software checksum speed Feb 12 20:37:27.391201 kernel: prefetch64-sse : 18463 MB/sec Feb 12 20:37:27.393509 kernel: generic_sse : 15768 MB/sec Feb 12 20:37:27.393558 kernel: xor: using function: prefetch64-sse (18463 MB/sec) Feb 12 20:37:27.506284 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:37:27.520669 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:37:27.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.522000 audit: BPF prog-id=7 op=LOAD Feb 12 20:37:27.522000 audit: BPF prog-id=8 op=LOAD Feb 12 20:37:27.524655 systemd[1]: Starting systemd-udevd.service... Feb 12 20:37:27.537348 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 12 20:37:27.542068 systemd[1]: Started systemd-udevd.service. Feb 12 20:37:27.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.551739 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:37:27.570048 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Feb 12 20:37:27.615528 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:37:27.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.618311 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:37:27.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:27.686210 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:37:27.755739 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Feb 12 20:37:27.766414 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:37:27.766448 kernel: GPT:17805311 != 41943039 Feb 12 20:37:27.766460 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:37:27.766472 kernel: GPT:17805311 != 41943039 Feb 12 20:37:27.766482 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:37:27.766492 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:37:27.788441 kernel: libata version 3.00 loaded. Feb 12 20:37:27.793422 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (434) Feb 12 20:37:27.797426 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 20:37:27.804693 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:37:27.837046 kernel: scsi host0: ata_piix Feb 12 20:37:27.837215 kernel: scsi host1: ata_piix Feb 12 20:37:27.837321 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Feb 12 20:37:27.837341 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Feb 12 20:37:27.841351 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:37:27.845088 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:37:27.846831 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:37:27.851585 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:37:27.854468 systemd[1]: Starting disk-uuid.service... Feb 12 20:37:27.864720 disk-uuid[461]: Primary Header is updated. Feb 12 20:37:27.864720 disk-uuid[461]: Secondary Entries is updated. Feb 12 20:37:27.864720 disk-uuid[461]: Secondary Header is updated. Feb 12 20:37:27.872417 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:37:27.878412 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:37:28.889453 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:37:28.891105 disk-uuid[462]: The operation has completed successfully. Feb 12 20:37:28.959162 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:37:28.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:28.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:28.959366 systemd[1]: Finished disk-uuid.service. Feb 12 20:37:28.986627 systemd[1]: Starting verity-setup.service... Feb 12 20:37:29.014455 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Feb 12 20:37:29.112067 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:37:29.116262 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:37:29.123645 systemd[1]: Finished verity-setup.service. Feb 12 20:37:29.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.251470 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:37:29.252661 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:37:29.253733 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:37:29.256447 systemd[1]: Starting ignition-setup.service... Feb 12 20:37:29.259108 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:37:29.271574 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:37:29.271623 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:37:29.271635 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:37:29.289718 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:37:29.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.303573 systemd[1]: Finished ignition-setup.service. Feb 12 20:37:29.305020 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:37:29.404661 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:37:29.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.405000 audit: BPF prog-id=9 op=LOAD Feb 12 20:37:29.406668 systemd[1]: Starting systemd-networkd.service... Feb 12 20:37:29.432840 systemd-networkd[632]: lo: Link UP Feb 12 20:37:29.432854 systemd-networkd[632]: lo: Gained carrier Feb 12 20:37:29.433713 systemd-networkd[632]: Enumeration completed Feb 12 20:37:29.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.433929 systemd-networkd[632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:37:29.435841 systemd-networkd[632]: eth0: Link UP Feb 12 20:37:29.435845 systemd-networkd[632]: eth0: Gained carrier Feb 12 20:37:29.436359 systemd[1]: Started systemd-networkd.service. Feb 12 20:37:29.437792 systemd[1]: Reached target network.target. Feb 12 20:37:29.441433 systemd[1]: Starting iscsiuio.service... Feb 12 20:37:29.452082 systemd[1]: Started iscsiuio.service. Feb 12 20:37:29.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.453337 systemd[1]: Starting iscsid.service... Feb 12 20:37:29.453953 systemd-networkd[632]: eth0: DHCPv4 address 172.24.4.200/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 12 20:37:29.457441 iscsid[641]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:37:29.457441 iscsid[641]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:37:29.457441 iscsid[641]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:37:29.457441 iscsid[641]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:37:29.457441 iscsid[641]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:37:29.457441 iscsid[641]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:37:29.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.459930 systemd[1]: Started iscsid.service. Feb 12 20:37:29.464415 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:37:29.475241 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:37:29.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.475806 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:37:29.476706 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:37:29.477678 systemd[1]: Reached target remote-fs.target. Feb 12 20:37:29.479754 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:37:29.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.488645 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:37:29.636772 ignition[551]: Ignition 2.14.0 Feb 12 20:37:29.636792 ignition[551]: Stage: fetch-offline Feb 12 20:37:29.636882 ignition[551]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:29.636961 ignition[551]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:29.641677 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:37:29.639037 ignition[551]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:29.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:29.645028 systemd[1]: Starting ignition-fetch.service... Feb 12 20:37:29.639242 ignition[551]: parsed url from cmdline: "" Feb 12 20:37:29.639250 ignition[551]: no config URL provided Feb 12 20:37:29.639262 ignition[551]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:37:29.639279 ignition[551]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:37:29.639297 ignition[551]: failed to fetch config: resource requires networking Feb 12 20:37:29.639974 ignition[551]: Ignition finished successfully Feb 12 20:37:29.663857 ignition[655]: Ignition 2.14.0 Feb 12 20:37:29.663881 ignition[655]: Stage: fetch Feb 12 20:37:29.664081 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:29.664121 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:29.665961 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:29.666144 ignition[655]: parsed url from cmdline: "" Feb 12 20:37:29.666153 ignition[655]: no config URL provided Feb 12 20:37:29.666165 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:37:29.666181 ignition[655]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:37:29.672120 ignition[655]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Feb 12 20:37:29.672158 ignition[655]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Feb 12 20:37:29.677461 ignition[655]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Feb 12 20:37:29.996421 ignition[655]: GET result: OK Feb 12 20:37:29.996653 ignition[655]: parsing config with SHA512: 800385004e4c3942c957f20f850239ba06c8c31367ad3e913a324a7f1f84098567218756401cf4e0b7dbcc701d987176233f17125350c66db4f9906cfa665308 Feb 12 20:37:30.101151 unknown[655]: fetched base config from "system" Feb 12 20:37:30.103182 unknown[655]: fetched base config from "system" Feb 12 20:37:30.104580 unknown[655]: fetched user config from "openstack" Feb 12 20:37:30.106112 ignition[655]: fetch: fetch complete Feb 12 20:37:30.106141 ignition[655]: fetch: fetch passed Feb 12 20:37:30.106251 ignition[655]: Ignition finished successfully Feb 12 20:37:30.112219 systemd[1]: Finished ignition-fetch.service. Feb 12 20:37:30.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.115320 systemd[1]: Starting ignition-kargs.service... Feb 12 20:37:30.136801 ignition[661]: Ignition 2.14.0 Feb 12 20:37:30.136828 ignition[661]: Stage: kargs Feb 12 20:37:30.137104 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:30.137149 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:30.139320 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:30.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.151729 systemd[1]: Finished ignition-kargs.service. Feb 12 20:37:30.142663 ignition[661]: kargs: kargs passed Feb 12 20:37:30.154931 systemd[1]: Starting ignition-disks.service... Feb 12 20:37:30.142758 ignition[661]: Ignition finished successfully Feb 12 20:37:30.172122 ignition[666]: Ignition 2.14.0 Feb 12 20:37:30.172145 ignition[666]: Stage: disks Feb 12 20:37:30.172351 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:30.172383 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:30.173734 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:30.175529 ignition[666]: disks: disks passed Feb 12 20:37:30.176555 systemd[1]: Finished ignition-disks.service. Feb 12 20:37:30.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.175588 ignition[666]: Ignition finished successfully Feb 12 20:37:30.178147 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:37:30.179316 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:37:30.180162 systemd[1]: Reached target local-fs.target. Feb 12 20:37:30.181095 systemd[1]: Reached target sysinit.target. Feb 12 20:37:30.181981 systemd[1]: Reached target basic.target. Feb 12 20:37:30.183756 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:37:30.205690 systemd-fsck[674]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 20:37:30.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.217621 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:37:30.218897 systemd[1]: Mounting sysroot.mount... Feb 12 20:37:30.235417 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:37:30.236289 systemd[1]: Mounted sysroot.mount. Feb 12 20:37:30.237440 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:37:30.240354 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:37:30.241877 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:37:30.243355 systemd[1]: Starting flatcar-openstack-hostname.service... Feb 12 20:37:30.245470 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:37:30.246485 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:37:30.248597 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:37:30.257579 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:37:30.259892 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:37:30.271854 initrd-setup-root[686]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:37:30.278919 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (681) Feb 12 20:37:30.284681 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:37:30.284752 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:37:30.284779 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:37:30.290956 initrd-setup-root[710]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:37:30.297941 initrd-setup-root[720]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:37:30.302435 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:37:30.307163 initrd-setup-root[728]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:37:30.389515 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:37:30.390889 systemd[1]: Starting ignition-mount.service... Feb 12 20:37:30.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.395450 systemd[1]: Starting sysroot-boot.service... Feb 12 20:37:30.403606 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 20:37:30.404428 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 20:37:30.426921 ignition[748]: INFO : Ignition 2.14.0 Feb 12 20:37:30.428030 ignition[748]: INFO : Stage: mount Feb 12 20:37:30.428729 ignition[748]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:30.429840 ignition[748]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:30.431814 ignition[748]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:30.435762 ignition[748]: INFO : mount: mount passed Feb 12 20:37:30.438272 ignition[748]: INFO : Ignition finished successfully Feb 12 20:37:30.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.439741 systemd[1]: Finished ignition-mount.service. Feb 12 20:37:30.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.445429 systemd[1]: Finished sysroot-boot.service. Feb 12 20:37:30.449974 coreos-metadata[680]: Feb 12 20:37:30.449 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 12 20:37:30.464797 coreos-metadata[680]: Feb 12 20:37:30.464 INFO Fetch successful Feb 12 20:37:30.464797 coreos-metadata[680]: Feb 12 20:37:30.464 INFO wrote hostname ci-3510-3-2-6-02325721ca.novalocal to /sysroot/etc/hostname Feb 12 20:37:30.468424 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Feb 12 20:37:30.468577 systemd[1]: Finished flatcar-openstack-hostname.service. Feb 12 20:37:30.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:30.471607 systemd[1]: Starting ignition-files.service... Feb 12 20:37:30.490169 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:37:30.504464 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (759) Feb 12 20:37:30.511996 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:37:30.512078 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:37:30.512103 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:37:30.526128 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:37:30.546825 ignition[778]: INFO : Ignition 2.14.0 Feb 12 20:37:30.546825 ignition[778]: INFO : Stage: files Feb 12 20:37:30.549484 ignition[778]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:30.549484 ignition[778]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:30.549484 ignition[778]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:30.555841 ignition[778]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:37:30.555841 ignition[778]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:37:30.555841 ignition[778]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:37:30.562066 ignition[778]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:37:30.562066 ignition[778]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:37:30.568641 ignition[778]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:37:30.568641 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:37:30.568641 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 20:37:30.563646 unknown[778]: wrote ssh authorized keys file for user: core Feb 12 20:37:30.718088 systemd-networkd[632]: eth0: Gained IPv6LL Feb 12 20:37:31.104592 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:37:31.950848 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 20:37:31.950848 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 20:37:31.950848 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:37:31.959428 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:37:32.451319 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:37:32.913597 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 20:37:32.913597 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 20:37:32.918680 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:37:32.918680 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 20:37:33.613041 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 20:37:34.037240 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 20:37:34.042080 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:37:34.042080 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:37:34.189711 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 20:37:35.065964 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 20:37:35.069898 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:37:35.069898 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:37:35.069898 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:37:35.177148 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 20:37:37.170003 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 20:37:37.171720 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:37:37.172527 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:37:37.172527 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 12 20:37:37.282614 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 20:37:38.185365 ignition[778]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:37:38.189468 ignition[778]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:37:38.189468 ignition[778]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:37:38.189468 ignition[778]: INFO : files: op(f): op(10): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 12 20:37:38.189468 ignition[778]: INFO : files: op(f): op(10): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 12 20:37:38.268553 kernel: kauditd_printk_skb: 28 callbacks suppressed Feb 12 20:37:38.268578 kernel: audit: type=1130 audit(1707770258.198:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.268592 kernel: audit: type=1130 audit(1707770258.231:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.268604 kernel: audit: type=1131 audit(1707770258.231:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.268616 kernel: audit: type=1130 audit(1707770258.250:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(11): [started] processing unit "coreos-metadata.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(11): op(12): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(11): op(12): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(11): [finished] processing unit "coreos-metadata.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(13): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(13): op(14): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(13): op(14): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(13): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(15): [started] processing unit "prepare-critools.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(15): op(16): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(15): op(16): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(15): [finished] processing unit "prepare-critools.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(17): [started] processing unit "prepare-helm.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(17): op(18): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(17): op(18): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 20:37:38.268764 ignition[778]: INFO : files: op(17): [finished] processing unit "prepare-helm.service" Feb 12 20:37:38.291446 kernel: audit: type=1130 audit(1707770258.282:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.291464 kernel: audit: type=1131 audit(1707770258.282:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.196553 systemd[1]: Finished ignition-files.service. Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(19): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(19): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(1c): [started] setting preset to enabled for "prepare-helm.service" Feb 12 20:37:38.292461 ignition[778]: INFO : files: op(1c): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 20:37:38.292461 ignition[778]: INFO : files: createResultFile: createFiles: op(1d): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:37:38.292461 ignition[778]: INFO : files: createResultFile: createFiles: op(1d): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:37:38.292461 ignition[778]: INFO : files: files passed Feb 12 20:37:38.292461 ignition[778]: INFO : Ignition finished successfully Feb 12 20:37:38.200070 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:37:38.309142 kernel: audit: type=1130 audit(1707770258.304:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.309202 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:37:38.222971 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:37:38.224185 systemd[1]: Starting ignition-quench.service... Feb 12 20:37:38.229691 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:37:38.229788 systemd[1]: Finished ignition-quench.service. Feb 12 20:37:38.243594 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:37:38.251593 systemd[1]: Reached target ignition-complete.target. Feb 12 20:37:38.325952 kernel: audit: type=1130 audit(1707770258.318:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.325968 kernel: audit: type=1131 audit(1707770258.318:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.262721 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:37:38.282187 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:37:38.282281 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:37:38.282918 systemd[1]: Reached target initrd-fs.target. Feb 12 20:37:38.332919 kernel: audit: type=1131 audit(1707770258.328:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.290758 systemd[1]: Reached target initrd.target. Feb 12 20:37:38.291926 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:37:38.292684 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:37:38.304541 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:37:38.305941 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:37:38.317984 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:37:38.318071 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:37:38.319434 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:37:38.326373 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:37:38.327288 systemd[1]: Stopped target timers.target. Feb 12 20:37:38.328193 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:37:38.328246 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:37:38.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.329085 systemd[1]: Stopped target initrd.target. Feb 12 20:37:38.333340 systemd[1]: Stopped target basic.target. Feb 12 20:37:38.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.334261 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:37:38.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.335433 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:37:38.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.336325 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:37:38.337304 systemd[1]: Stopped target remote-fs.target. Feb 12 20:37:38.338220 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:37:38.339151 systemd[1]: Stopped target sysinit.target. Feb 12 20:37:38.340006 systemd[1]: Stopped target local-fs.target. Feb 12 20:37:38.340851 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:37:38.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.341710 systemd[1]: Stopped target swap.target. Feb 12 20:37:38.342537 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:37:38.342577 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:37:38.343460 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:37:38.344263 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:37:38.344300 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:37:38.345146 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:37:38.345183 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:37:38.345988 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:37:38.346025 systemd[1]: Stopped ignition-files.service. Feb 12 20:37:38.347500 systemd[1]: Stopping ignition-mount.service... Feb 12 20:37:38.365174 ignition[816]: INFO : Ignition 2.14.0 Feb 12 20:37:38.365174 ignition[816]: INFO : Stage: umount Feb 12 20:37:38.352951 systemd[1]: Stopping iscsiuio.service... Feb 12 20:37:38.353330 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:37:38.353379 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:37:38.355794 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:37:38.356258 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:37:38.356314 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:37:38.356876 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:37:38.356940 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:37:38.370425 ignition[816]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:37:38.370425 ignition[816]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:37:38.357834 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:37:38.357935 systemd[1]: Stopped iscsiuio.service. Feb 12 20:37:38.373063 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:37:38.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.381542 ignition[816]: INFO : umount: umount passed Feb 12 20:37:38.381542 ignition[816]: INFO : Ignition finished successfully Feb 12 20:37:38.377489 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:37:38.377579 systemd[1]: Stopped ignition-mount.service. Feb 12 20:37:38.378133 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:37:38.378174 systemd[1]: Stopped ignition-disks.service. Feb 12 20:37:38.378829 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:37:38.378868 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:37:38.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.379311 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 20:37:38.379345 systemd[1]: Stopped ignition-fetch.service. Feb 12 20:37:38.379872 systemd[1]: Stopped target network.target. Feb 12 20:37:38.380381 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:37:38.380446 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:37:38.380961 systemd[1]: Stopped target paths.target. Feb 12 20:37:38.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.381357 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:37:38.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.385518 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:37:38.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.385998 systemd[1]: Stopped target slices.target. Feb 12 20:37:38.398000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:37:38.386376 systemd[1]: Stopped target sockets.target. Feb 12 20:37:38.386804 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:37:38.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.386831 systemd[1]: Closed iscsid.socket. Feb 12 20:37:38.387252 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:37:38.387281 systemd[1]: Closed iscsiuio.socket. Feb 12 20:37:38.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.387704 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:37:38.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.387740 systemd[1]: Stopped ignition-setup.service. Feb 12 20:37:38.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.388411 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:37:38.389053 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:37:38.391646 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:37:38.392152 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:37:38.392238 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:37:38.392540 systemd-networkd[632]: eth0: DHCPv6 lease lost Feb 12 20:37:38.409000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:37:38.395365 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:37:38.395489 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:37:38.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.396216 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:37:38.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.396331 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:37:38.398944 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:37:38.398977 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:37:38.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.399808 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:37:38.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.399860 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:37:38.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.401490 systemd[1]: Stopping network-cleanup.service... Feb 12 20:37:38.403607 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:37:38.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.403652 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:37:38.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:38.404573 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:37:38.404608 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:37:38.405647 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:37:38.405682 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:37:38.406449 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:37:38.408495 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:37:38.411348 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:37:38.411472 systemd[1]: Stopped network-cleanup.service. Feb 12 20:37:38.412697 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:37:38.412823 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:37:38.413779 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:37:38.413813 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:37:38.414449 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:37:38.414479 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:37:38.415470 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:37:38.415509 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:37:38.416299 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:37:38.416334 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:37:38.417129 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:37:38.417163 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:37:38.418664 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:37:38.419425 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:37:38.419473 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:37:38.425286 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:37:38.425373 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:37:38.426136 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:37:38.427721 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:37:38.445790 systemd[1]: Switching root. Feb 12 20:37:38.466324 systemd-journald[184]: Journal stopped Feb 12 20:37:42.538557 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). Feb 12 20:37:42.538615 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:37:42.538636 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:37:42.538648 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:37:42.538659 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:37:42.538669 kernel: SELinux: policy capability open_perms=1 Feb 12 20:37:42.538683 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:37:42.538693 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:37:42.538704 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:37:42.538717 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:37:42.538727 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:37:42.538737 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:37:42.538750 systemd[1]: Successfully loaded SELinux policy in 95.271ms. Feb 12 20:37:42.538767 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.419ms. Feb 12 20:37:42.538787 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:37:42.538799 systemd[1]: Detected virtualization kvm. Feb 12 20:37:42.538810 systemd[1]: Detected architecture x86-64. Feb 12 20:37:42.538821 systemd[1]: Detected first boot. Feb 12 20:37:42.538833 systemd[1]: Hostname set to . Feb 12 20:37:42.538844 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:37:42.538855 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:37:42.538869 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:37:42.538881 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:37:42.538893 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:37:42.538906 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:37:42.538918 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:37:42.538930 systemd[1]: Stopped iscsid.service. Feb 12 20:37:42.538941 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:37:42.538954 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:37:42.538966 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:37:42.538977 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:37:42.538993 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:37:42.539005 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 20:37:42.539017 systemd[1]: Created slice system-getty.slice. Feb 12 20:37:42.539028 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:37:42.539040 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:37:42.539052 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:37:42.539066 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:37:42.539077 systemd[1]: Created slice user.slice. Feb 12 20:37:42.539088 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:37:42.539100 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:37:42.539111 systemd[1]: Set up automount boot.automount. Feb 12 20:37:42.539122 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:37:42.539135 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:37:42.539147 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:37:42.539158 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:37:42.539174 systemd[1]: Reached target integritysetup.target. Feb 12 20:37:42.539185 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:37:42.539197 systemd[1]: Reached target remote-fs.target. Feb 12 20:37:42.539208 systemd[1]: Reached target slices.target. Feb 12 20:37:42.539219 systemd[1]: Reached target swap.target. Feb 12 20:37:42.539230 systemd[1]: Reached target torcx.target. Feb 12 20:37:42.539242 systemd[1]: Reached target veritysetup.target. Feb 12 20:37:42.539256 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:37:42.539269 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:37:42.539280 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:37:42.539292 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:37:42.539303 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:37:42.539314 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:37:42.539326 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:37:42.539336 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:37:42.539348 systemd[1]: Mounting media.mount... Feb 12 20:37:42.539362 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:37:42.539374 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:37:42.544015 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:37:42.544040 systemd[1]: Mounting tmp.mount... Feb 12 20:37:42.544052 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:37:42.544064 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:37:42.544076 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:37:42.544087 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:37:42.544099 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:37:42.544115 systemd[1]: Starting modprobe@drm.service... Feb 12 20:37:42.544126 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:37:42.544137 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:37:42.544149 systemd[1]: Starting modprobe@loop.service... Feb 12 20:37:42.544161 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:37:42.544173 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:37:42.544184 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:37:42.544213 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:37:42.544225 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:37:42.544239 systemd[1]: Stopped systemd-journald.service. Feb 12 20:37:42.544251 systemd[1]: Starting systemd-journald.service... Feb 12 20:37:42.544262 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:37:42.544274 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:37:42.544289 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:37:42.544308 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:37:42.544321 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:37:42.544333 systemd[1]: Stopped verity-setup.service. Feb 12 20:37:42.544346 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:37:42.544360 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:37:42.544372 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:37:42.544403 systemd[1]: Mounted media.mount. Feb 12 20:37:42.544417 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:37:42.544429 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:37:42.544440 systemd[1]: Mounted tmp.mount. Feb 12 20:37:42.544452 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:37:42.544468 systemd-journald[926]: Journal started Feb 12 20:37:42.547131 systemd-journald[926]: Runtime Journal (/run/log/journal/b705ec3778174671bba08740b9fa3a63) is 4.9M, max 39.5M, 34.5M free. Feb 12 20:37:42.547233 kernel: loop: module loaded Feb 12 20:37:42.547265 kernel: fuse: init (API version 7.34) Feb 12 20:37:38.743000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:37:38.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:37:38.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:37:38.867000 audit: BPF prog-id=10 op=LOAD Feb 12 20:37:38.867000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:37:38.867000 audit: BPF prog-id=11 op=LOAD Feb 12 20:37:38.867000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:37:39.013000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:37:39.013000 audit[848]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178cc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:37:39.013000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:37:39.015000 audit[848]: AVC avc: denied { associate } for pid=848 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:37:39.015000 audit[848]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a5 a2=1ed a3=0 items=2 ppid=831 pid=848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:37:39.015000 audit: CWD cwd="/" Feb 12 20:37:39.015000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:39.015000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:39.015000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:37:42.342000 audit: BPF prog-id=12 op=LOAD Feb 12 20:37:42.342000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:37:42.343000 audit: BPF prog-id=13 op=LOAD Feb 12 20:37:42.343000 audit: BPF prog-id=14 op=LOAD Feb 12 20:37:42.343000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:37:42.343000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:37:42.345000 audit: BPF prog-id=15 op=LOAD Feb 12 20:37:42.345000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:37:42.345000 audit: BPF prog-id=16 op=LOAD Feb 12 20:37:42.345000 audit: BPF prog-id=17 op=LOAD Feb 12 20:37:42.345000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:37:42.345000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:37:42.346000 audit: BPF prog-id=18 op=LOAD Feb 12 20:37:42.346000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:37:42.346000 audit: BPF prog-id=19 op=LOAD Feb 12 20:37:42.347000 audit: BPF prog-id=20 op=LOAD Feb 12 20:37:42.347000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:37:42.347000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:37:42.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.357000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:37:42.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.493000 audit: BPF prog-id=21 op=LOAD Feb 12 20:37:42.493000 audit: BPF prog-id=22 op=LOAD Feb 12 20:37:42.493000 audit: BPF prog-id=23 op=LOAD Feb 12 20:37:42.494000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:37:42.494000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:37:42.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.532000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:37:42.532000 audit[926]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffd2881850 a2=4000 a3=7fffd28818ec items=0 ppid=1 pid=926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:37:42.532000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:37:42.553761 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:37:42.553800 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:37:42.553816 systemd[1]: Started systemd-journald.service. Feb 12 20:37:42.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.341299 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:37:39.010117 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:37:42.341312 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 20:37:39.010964 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:37:42.348178 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:37:42.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:39.010986 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:37:42.554611 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:37:39.011049 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:37:42.554822 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:37:39.011061 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:37:42.555983 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:37:39.011090 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:37:42.556213 systemd[1]: Finished modprobe@drm.service. Feb 12 20:37:39.011105 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:37:39.011319 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:37:39.011358 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:37:39.011372 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:37:42.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:39.012169 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:37:42.558653 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:37:39.012221 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:37:39.012242 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:37:39.012260 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:37:39.012286 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:37:39.012303 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:39Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:37:41.880603 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:41Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:37:41.880877 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:41Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:37:41.881000 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:41Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:37:41.881229 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:41Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:37:41.881287 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:41Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:37:41.881357 /usr/lib/systemd/system-generators/torcx-generator[848]: time="2024-02-12T20:37:41Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:37:42.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.560064 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:37:42.561336 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:37:42.561543 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:37:42.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.562410 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:37:42.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.562773 systemd[1]: Finished modprobe@loop.service. Feb 12 20:37:42.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.563854 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:37:42.565092 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:37:42.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.567760 systemd[1]: Reached target network-pre.target. Feb 12 20:37:42.570556 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:37:42.574054 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:37:42.575532 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:37:42.579288 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:37:42.583523 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:37:42.584831 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:37:42.587764 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:37:42.588778 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:37:42.590276 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:37:42.591420 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:37:42.593175 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:37:42.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.595099 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:37:42.601705 systemd-journald[926]: Time spent on flushing to /var/log/journal/b705ec3778174671bba08740b9fa3a63 is 30.732ms for 1135 entries. Feb 12 20:37:42.601705 systemd-journald[926]: System Journal (/var/log/journal/b705ec3778174671bba08740b9fa3a63) is 8.0M, max 584.8M, 576.8M free. Feb 12 20:37:42.707472 systemd-journald[926]: Received client request to flush runtime journal. Feb 12 20:37:42.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.619631 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:37:42.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.622345 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:37:42.709547 udevadm[957]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 20:37:42.636229 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:37:42.637188 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:37:42.637761 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:37:42.642443 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:37:42.644303 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:37:42.708708 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:37:42.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:42.727322 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:37:43.286344 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:37:43.299522 kernel: kauditd_printk_skb: 106 callbacks suppressed Feb 12 20:37:43.299654 kernel: audit: type=1130 audit(1707770263.286:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.289000 audit: BPF prog-id=24 op=LOAD Feb 12 20:37:43.300472 systemd[1]: Starting systemd-udevd.service... Feb 12 20:37:43.302882 kernel: audit: type=1334 audit(1707770263.289:147): prog-id=24 op=LOAD Feb 12 20:37:43.302953 kernel: audit: type=1334 audit(1707770263.299:148): prog-id=25 op=LOAD Feb 12 20:37:43.302993 kernel: audit: type=1334 audit(1707770263.299:149): prog-id=7 op=UNLOAD Feb 12 20:37:43.303031 kernel: audit: type=1334 audit(1707770263.299:150): prog-id=8 op=UNLOAD Feb 12 20:37:43.299000 audit: BPF prog-id=25 op=LOAD Feb 12 20:37:43.299000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:37:43.299000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:37:43.342380 systemd-udevd[959]: Using default interface naming scheme 'v252'. Feb 12 20:37:43.398224 systemd[1]: Started systemd-udevd.service. Feb 12 20:37:43.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.409452 kernel: audit: type=1130 audit(1707770263.398:151): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.414000 audit: BPF prog-id=26 op=LOAD Feb 12 20:37:43.420806 kernel: audit: type=1334 audit(1707770263.414:152): prog-id=26 op=LOAD Feb 12 20:37:43.422888 systemd[1]: Starting systemd-networkd.service... Feb 12 20:37:43.436000 audit: BPF prog-id=27 op=LOAD Feb 12 20:37:43.440471 kernel: audit: type=1334 audit(1707770263.436:153): prog-id=27 op=LOAD Feb 12 20:37:43.440000 audit: BPF prog-id=28 op=LOAD Feb 12 20:37:43.440000 audit: BPF prog-id=29 op=LOAD Feb 12 20:37:43.448744 kernel: audit: type=1334 audit(1707770263.440:154): prog-id=28 op=LOAD Feb 12 20:37:43.448811 kernel: audit: type=1334 audit(1707770263.440:155): prog-id=29 op=LOAD Feb 12 20:37:43.449808 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:37:43.466871 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:37:43.503766 systemd[1]: Started systemd-userdbd.service. Feb 12 20:37:43.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.553417 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 20:37:43.566328 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:37:43.592333 systemd-networkd[975]: lo: Link UP Feb 12 20:37:43.592343 systemd-networkd[975]: lo: Gained carrier Feb 12 20:37:43.592815 systemd-networkd[975]: Enumeration completed Feb 12 20:37:43.592943 systemd-networkd[975]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:37:43.593120 systemd[1]: Started systemd-networkd.service. Feb 12 20:37:43.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.594841 systemd-networkd[975]: eth0: Link UP Feb 12 20:37:43.594847 systemd-networkd[975]: eth0: Gained carrier Feb 12 20:37:43.587000 audit[961]: AVC avc: denied { confidentiality } for pid=961 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:37:43.604209 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:37:43.605533 systemd-networkd[975]: eth0: DHCPv4 address 172.24.4.200/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 12 20:37:43.587000 audit[961]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5578af265090 a1=32194 a2=7fae6c7fabc5 a3=5 items=108 ppid=959 pid=961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:37:43.587000 audit: CWD cwd="/" Feb 12 20:37:43.587000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=1 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=2 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=3 name=(null) inode=14018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=4 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=5 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=6 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=7 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=8 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=9 name=(null) inode=14021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=10 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=11 name=(null) inode=14022 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=12 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=13 name=(null) inode=14023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=14 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=15 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=16 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=17 name=(null) inode=14025 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=18 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=19 name=(null) inode=14026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=20 name=(null) inode=14026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=21 name=(null) inode=14027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=22 name=(null) inode=14026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=23 name=(null) inode=14028 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=24 name=(null) inode=14026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=25 name=(null) inode=14029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=26 name=(null) inode=14026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=27 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=28 name=(null) inode=14026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=29 name=(null) inode=14031 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=30 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=31 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=32 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=33 name=(null) inode=14033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=34 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=35 name=(null) inode=14034 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=36 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=37 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=38 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=39 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=40 name=(null) inode=14032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=41 name=(null) inode=14037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=42 name=(null) inode=14017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=43 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=44 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=45 name=(null) inode=14039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=46 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=47 name=(null) inode=14040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=48 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=49 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=50 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=51 name=(null) inode=14042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=52 name=(null) inode=14038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=53 name=(null) inode=14043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=55 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=56 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=57 name=(null) inode=14045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=58 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=59 name=(null) inode=14046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=60 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=61 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=62 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=63 name=(null) inode=14048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=64 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=65 name=(null) inode=14049 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=66 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=67 name=(null) inode=14050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=68 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=69 name=(null) inode=14051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=70 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=71 name=(null) inode=14052 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=72 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=73 name=(null) inode=14053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=74 name=(null) inode=14053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=75 name=(null) inode=14054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=76 name=(null) inode=14053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=77 name=(null) inode=14055 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=78 name=(null) inode=14053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=79 name=(null) inode=14056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=80 name=(null) inode=14053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=81 name=(null) inode=14057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=82 name=(null) inode=14053 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=83 name=(null) inode=14058 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=84 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=85 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=86 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=87 name=(null) inode=14060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=88 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=89 name=(null) inode=14061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=90 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=91 name=(null) inode=14062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=92 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=93 name=(null) inode=14063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=94 name=(null) inode=14059 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=95 name=(null) inode=14064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=96 name=(null) inode=14044 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=97 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=98 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=99 name=(null) inode=14066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=100 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=101 name=(null) inode=14067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=102 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=103 name=(null) inode=14068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=104 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=105 name=(null) inode=14069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=106 name=(null) inode=14065 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PATH item=107 name=(null) inode=14070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:37:43.587000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:37:43.617434 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 20:37:43.629439 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:37:43.634421 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 20:37:43.679828 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:37:43.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.681565 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:37:43.833769 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:37:43.974449 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:37:43.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:43.975903 systemd[1]: Reached target cryptsetup.target. Feb 12 20:37:43.979563 systemd[1]: Starting lvm2-activation.service... Feb 12 20:37:43.988612 lvm[989]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:37:44.051436 systemd[1]: Finished lvm2-activation.service. Feb 12 20:37:44.052865 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:37:44.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.054019 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:37:44.054080 systemd[1]: Reached target local-fs.target. Feb 12 20:37:44.055152 systemd[1]: Reached target machines.target. Feb 12 20:37:44.058898 systemd[1]: Starting ldconfig.service... Feb 12 20:37:44.098382 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:37:44.098523 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:37:44.100722 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:37:44.103790 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:37:44.107628 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:37:44.109253 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:37:44.109366 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:37:44.111534 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:37:44.197502 systemd[1]: boot.automount: Got automount request for /boot, triggered by 991 (bootctl) Feb 12 20:37:44.212330 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:37:44.220372 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:37:44.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.524994 systemd-tmpfiles[994]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:37:44.546602 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:37:44.548789 systemd-tmpfiles[994]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:37:44.549174 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:37:44.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.569649 systemd-tmpfiles[994]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:37:44.736653 systemd-fsck[1001]: fsck.fat 4.2 (2021-01-31) Feb 12 20:37:44.736653 systemd-fsck[1001]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 20:37:44.745363 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:37:44.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.749346 systemd[1]: Mounting boot.mount... Feb 12 20:37:44.780480 systemd[1]: Mounted boot.mount. Feb 12 20:37:44.810175 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:37:44.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.878064 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:37:44.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.882016 systemd[1]: Starting audit-rules.service... Feb 12 20:37:44.885259 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:37:44.891044 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:37:44.897000 audit: BPF prog-id=30 op=LOAD Feb 12 20:37:44.900646 systemd[1]: Starting systemd-resolved.service... Feb 12 20:37:44.906000 audit: BPF prog-id=31 op=LOAD Feb 12 20:37:44.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.912577 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:37:44.914406 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:37:44.915750 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:37:44.916614 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:37:44.924000 audit[1016]: SYSTEM_BOOT pid=1016 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.930436 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:37:44.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:37:44.964735 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:37:44.990000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:37:44.990000 audit[1025]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf878f190 a2=420 a3=0 items=0 ppid=1005 pid=1025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:37:44.990000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:37:44.990769 augenrules[1025]: No rules Feb 12 20:37:44.992098 systemd[1]: Finished audit-rules.service. Feb 12 20:37:45.010697 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:37:45.011254 systemd[1]: Reached target time-set.target. Feb 12 20:37:45.011666 systemd-resolved[1011]: Positive Trust Anchors: Feb 12 20:37:45.011933 systemd-resolved[1011]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:37:45.012461 systemd-resolved[1011]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:37:45.023876 systemd-resolved[1011]: Using system hostname 'ci-3510-3-2-6-02325721ca.novalocal'. Feb 12 20:37:45.026050 systemd[1]: Started systemd-resolved.service. Feb 12 20:37:45.026654 systemd[1]: Reached target network.target. Feb 12 20:37:45.027096 systemd[1]: Reached target nss-lookup.target. Feb 12 20:37:45.749815 systemd-resolved[1011]: Clock change detected. Flushing caches. Feb 12 20:37:45.749896 systemd-timesyncd[1012]: Contacted time server 176.137.36.37:123 (0.flatcar.pool.ntp.org). Feb 12 20:37:45.749990 systemd-timesyncd[1012]: Initial clock synchronization to Mon 2024-02-12 20:37:45.749713 UTC. Feb 12 20:37:45.808649 systemd-networkd[975]: eth0: Gained IPv6LL Feb 12 20:37:45.831651 ldconfig[990]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:37:45.848013 systemd[1]: Finished ldconfig.service. Feb 12 20:37:45.851870 systemd[1]: Starting systemd-update-done.service... Feb 12 20:37:45.865728 systemd[1]: Finished systemd-update-done.service. Feb 12 20:37:45.867058 systemd[1]: Reached target sysinit.target. Feb 12 20:37:45.868387 systemd[1]: Started motdgen.path. Feb 12 20:37:45.869568 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:37:45.871420 systemd[1]: Started logrotate.timer. Feb 12 20:37:45.872688 systemd[1]: Started mdadm.timer. Feb 12 20:37:45.873711 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:37:45.874822 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:37:45.874901 systemd[1]: Reached target paths.target. Feb 12 20:37:45.876014 systemd[1]: Reached target timers.target. Feb 12 20:37:45.878211 systemd[1]: Listening on dbus.socket. Feb 12 20:37:45.881659 systemd[1]: Starting docker.socket... Feb 12 20:37:45.888449 systemd[1]: Listening on sshd.socket. Feb 12 20:37:45.889789 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:37:45.890823 systemd[1]: Listening on docker.socket. Feb 12 20:37:45.892056 systemd[1]: Reached target sockets.target. Feb 12 20:37:45.893134 systemd[1]: Reached target basic.target. Feb 12 20:37:45.894365 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:37:45.894432 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:37:45.896666 systemd[1]: Starting containerd.service... Feb 12 20:37:45.899989 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:37:45.903611 systemd[1]: Starting dbus.service... Feb 12 20:37:45.908415 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:37:45.923117 systemd[1]: Starting extend-filesystems.service... Feb 12 20:37:45.924643 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:37:45.927554 systemd[1]: Starting motdgen.service... Feb 12 20:37:45.936600 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:37:45.938166 systemd[1]: Starting prepare-critools.service... Feb 12 20:37:45.940433 systemd[1]: Starting prepare-helm.service... Feb 12 20:37:45.943293 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:37:45.944677 systemd[1]: Starting sshd-keygen.service... Feb 12 20:37:45.948795 systemd[1]: Starting systemd-logind.service... Feb 12 20:37:45.949900 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:37:45.949956 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 20:37:45.950373 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:37:45.952675 systemd[1]: Starting update-engine.service... Feb 12 20:37:45.954129 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:37:45.968322 jq[1051]: true Feb 12 20:37:45.972494 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:37:45.972660 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:37:45.977981 tar[1053]: ./ Feb 12 20:37:45.977981 tar[1053]: ./loopback Feb 12 20:37:45.980250 tar[1055]: linux-amd64/helm Feb 12 20:37:45.984864 tar[1054]: crictl Feb 12 20:37:45.989349 jq[1063]: true Feb 12 20:37:45.997315 jq[1039]: false Feb 12 20:37:45.997892 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:37:45.998049 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:37:46.028718 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:37:46.028871 systemd[1]: Finished motdgen.service. Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda1 Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda2 Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda3 Feb 12 20:37:46.040999 extend-filesystems[1040]: Found usr Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda4 Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda6 Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda7 Feb 12 20:37:46.040999 extend-filesystems[1040]: Found vda9 Feb 12 20:37:46.040999 extend-filesystems[1040]: Checking size of /dev/vda9 Feb 12 20:37:46.069375 extend-filesystems[1040]: Resized partition /dev/vda9 Feb 12 20:37:46.091296 extend-filesystems[1094]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:37:46.129031 bash[1089]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:37:46.129515 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:37:46.134268 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Feb 12 20:37:46.135561 dbus-daemon[1036]: [system] SELinux support is enabled Feb 12 20:37:46.135749 systemd[1]: Started dbus.service. Feb 12 20:37:46.138353 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:37:46.138386 systemd[1]: Reached target system-config.target. Feb 12 20:37:46.138928 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:37:46.138956 systemd[1]: Reached target user-config.target. Feb 12 20:37:46.160795 update_engine[1050]: I0212 20:37:46.159713 1050 main.cc:92] Flatcar Update Engine starting Feb 12 20:37:46.171308 systemd[1]: Started update-engine.service. Feb 12 20:37:46.174731 systemd[1]: Started locksmithd.service. Feb 12 20:37:46.176975 update_engine[1050]: I0212 20:37:46.176927 1050 update_check_scheduler.cc:74] Next update check in 8m30s Feb 12 20:37:46.193479 env[1059]: time="2024-02-12T20:37:46.193397268Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:37:46.204241 systemd-logind[1049]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:37:46.204272 systemd-logind[1049]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:37:46.204762 systemd-logind[1049]: New seat seat0. Feb 12 20:37:46.211197 systemd[1]: Started systemd-logind.service. Feb 12 20:37:46.229240 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Feb 12 20:37:46.295456 coreos-metadata[1035]: Feb 12 20:37:46.239 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 12 20:37:46.295785 env[1059]: time="2024-02-12T20:37:46.255732267Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:37:46.298313 env[1059]: time="2024-02-12T20:37:46.296964468Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:37:46.298381 extend-filesystems[1094]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 20:37:46.298381 extend-filesystems[1094]: old_desc_blocks = 1, new_desc_blocks = 3 Feb 12 20:37:46.298381 extend-filesystems[1094]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Feb 12 20:37:46.302145 extend-filesystems[1040]: Resized filesystem in /dev/vda9 Feb 12 20:37:46.298602 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:37:46.298808 systemd[1]: Finished extend-filesystems.service. Feb 12 20:37:46.306537 tar[1053]: ./bandwidth Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310364840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310400127Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310601564Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310620871Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310640207Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310652179Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310730216Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.310956801Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.311080362Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:37:46.311338 env[1059]: time="2024-02-12T20:37:46.311098947Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:37:46.311590 env[1059]: time="2024-02-12T20:37:46.311149662Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:37:46.311590 env[1059]: time="2024-02-12T20:37:46.311165252Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330818501Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330877542Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330892831Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330941001Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330964305Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330983841Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.330998088Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.331044185Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.331060796Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.331077006Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.331091854Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.331253 env[1059]: time="2024-02-12T20:37:46.331105800Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:37:46.332064 env[1059]: time="2024-02-12T20:37:46.331678895Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:37:46.332064 env[1059]: time="2024-02-12T20:37:46.331781758Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:37:46.332194 env[1059]: time="2024-02-12T20:37:46.332139789Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:37:46.332248 env[1059]: time="2024-02-12T20:37:46.332234196Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332278 env[1059]: time="2024-02-12T20:37:46.332259133Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:37:46.332359 env[1059]: time="2024-02-12T20:37:46.332337931Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332399 env[1059]: time="2024-02-12T20:37:46.332361395Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332399 env[1059]: time="2024-02-12T20:37:46.332381933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332450 env[1059]: time="2024-02-12T20:37:46.332397513Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332450 env[1059]: time="2024-02-12T20:37:46.332414084Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332450 env[1059]: time="2024-02-12T20:37:46.332430975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332516 env[1059]: time="2024-02-12T20:37:46.332453508Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332516 env[1059]: time="2024-02-12T20:37:46.332469949Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332516 env[1059]: time="2024-02-12T20:37:46.332488213Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:37:46.332747 env[1059]: time="2024-02-12T20:37:46.332718545Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332787 env[1059]: time="2024-02-12T20:37:46.332746267Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332787 env[1059]: time="2024-02-12T20:37:46.332763870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.332787 env[1059]: time="2024-02-12T20:37:46.332779760Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:37:46.332863 env[1059]: time="2024-02-12T20:37:46.332805849Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:37:46.332863 env[1059]: time="2024-02-12T20:37:46.332821468Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:37:46.332863 env[1059]: time="2024-02-12T20:37:46.332843449Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:37:46.332945 env[1059]: time="2024-02-12T20:37:46.332887071Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:37:46.333231 env[1059]: time="2024-02-12T20:37:46.333135898Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.333244221Z" level=info msg="Connect containerd service" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.333292100Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.334156251Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335269088Z" level=info msg="Start subscribing containerd event" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335556067Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335594589Z" level=info msg="Start recovering state" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335627050Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335689497Z" level=info msg="Start event monitor" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335717419Z" level=info msg="Start snapshots syncer" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335730093Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:37:46.336998 env[1059]: time="2024-02-12T20:37:46.335740012Z" level=info msg="Start streaming server" Feb 12 20:37:46.335800 systemd[1]: Started containerd.service. Feb 12 20:37:46.337757 env[1059]: time="2024-02-12T20:37:46.337726427Z" level=info msg="containerd successfully booted in 0.167075s" Feb 12 20:37:46.395059 tar[1053]: ./ptp Feb 12 20:37:46.488201 tar[1053]: ./vlan Feb 12 20:37:46.553142 tar[1053]: ./host-device Feb 12 20:37:46.596554 coreos-metadata[1035]: Feb 12 20:37:46.596 INFO Fetch successful Feb 12 20:37:46.596554 coreos-metadata[1035]: Feb 12 20:37:46.596 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 20:37:46.611274 coreos-metadata[1035]: Feb 12 20:37:46.611 INFO Fetch successful Feb 12 20:37:46.620807 unknown[1035]: wrote ssh authorized keys file for user: core Feb 12 20:37:46.664238 tar[1053]: ./tuning Feb 12 20:37:46.668071 update-ssh-keys[1102]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:37:46.668450 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 20:37:46.733891 tar[1053]: ./vrf Feb 12 20:37:46.800758 tar[1053]: ./sbr Feb 12 20:37:46.869318 tar[1053]: ./tap Feb 12 20:37:46.948953 tar[1053]: ./dhcp Feb 12 20:37:47.140458 tar[1053]: ./static Feb 12 20:37:47.156276 systemd[1]: Finished prepare-critools.service. Feb 12 20:37:47.171654 sshd_keygen[1065]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:37:47.183130 tar[1053]: ./firewall Feb 12 20:37:47.187359 tar[1055]: linux-amd64/LICENSE Feb 12 20:37:47.187958 tar[1055]: linux-amd64/README.md Feb 12 20:37:47.194148 systemd[1]: Finished prepare-helm.service. Feb 12 20:37:47.206306 systemd[1]: Finished sshd-keygen.service. Feb 12 20:37:47.208445 systemd[1]: Starting issuegen.service... Feb 12 20:37:47.214393 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:37:47.214534 systemd[1]: Finished issuegen.service. Feb 12 20:37:47.216215 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:37:47.230373 tar[1053]: ./macvlan Feb 12 20:37:47.244448 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:37:47.246247 systemd[1]: Started getty@tty1.service. Feb 12 20:37:47.247798 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:37:47.249170 systemd[1]: Reached target getty.target. Feb 12 20:37:47.269882 tar[1053]: ./dummy Feb 12 20:37:47.308494 tar[1053]: ./bridge Feb 12 20:37:47.351159 tar[1053]: ./ipvlan Feb 12 20:37:47.389752 tar[1053]: ./portmap Feb 12 20:37:47.426536 tar[1053]: ./host-local Feb 12 20:37:47.473776 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:37:47.474555 systemd[1]: Reached target multi-user.target. Feb 12 20:37:47.476196 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:37:47.485049 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:37:47.485216 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:37:47.485858 systemd[1]: Startup finished in 936ms (kernel) + 11.904s (initrd) + 8.234s (userspace) = 21.074s. Feb 12 20:37:47.535266 locksmithd[1097]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:37:48.648718 systemd[1]: Created slice system-sshd.slice. Feb 12 20:37:48.651485 systemd[1]: Started sshd@0-172.24.4.200:22-172.24.4.1:35144.service. Feb 12 20:37:49.708134 sshd[1126]: Accepted publickey for core from 172.24.4.1 port 35144 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:37:49.712624 sshd[1126]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:37:49.738621 systemd[1]: Created slice user-500.slice. Feb 12 20:37:49.742783 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:37:49.751720 systemd-logind[1049]: New session 1 of user core. Feb 12 20:37:49.764769 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:37:49.768681 systemd[1]: Starting user@500.service... Feb 12 20:37:49.775648 (systemd)[1129]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:37:49.900636 systemd[1129]: Queued start job for default target default.target. Feb 12 20:37:49.901217 systemd[1129]: Reached target paths.target. Feb 12 20:37:49.901257 systemd[1129]: Reached target sockets.target. Feb 12 20:37:49.901273 systemd[1129]: Reached target timers.target. Feb 12 20:37:49.901286 systemd[1129]: Reached target basic.target. Feb 12 20:37:49.901326 systemd[1129]: Reached target default.target. Feb 12 20:37:49.901349 systemd[1129]: Startup finished in 113ms. Feb 12 20:37:49.903366 systemd[1]: Started user@500.service. Feb 12 20:37:49.907955 systemd[1]: Started session-1.scope. Feb 12 20:37:50.457052 systemd[1]: Started sshd@1-172.24.4.200:22-172.24.4.1:35150.service. Feb 12 20:37:52.666183 sshd[1138]: Accepted publickey for core from 172.24.4.1 port 35150 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:37:52.668880 sshd[1138]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:37:52.680711 systemd-logind[1049]: New session 2 of user core. Feb 12 20:37:52.681886 systemd[1]: Started session-2.scope. Feb 12 20:37:53.316553 sshd[1138]: pam_unix(sshd:session): session closed for user core Feb 12 20:37:53.325532 systemd[1]: Started sshd@2-172.24.4.200:22-172.24.4.1:35160.service. Feb 12 20:37:53.326800 systemd[1]: sshd@1-172.24.4.200:22-172.24.4.1:35150.service: Deactivated successfully. Feb 12 20:37:53.328388 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:37:53.332788 systemd-logind[1049]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:37:53.335648 systemd-logind[1049]: Removed session 2. Feb 12 20:37:54.558214 sshd[1143]: Accepted publickey for core from 172.24.4.1 port 35160 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:37:54.560869 sshd[1143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:37:54.572201 systemd-logind[1049]: New session 3 of user core. Feb 12 20:37:54.573168 systemd[1]: Started session-3.scope. Feb 12 20:37:55.077528 sshd[1143]: pam_unix(sshd:session): session closed for user core Feb 12 20:37:55.084161 systemd[1]: Started sshd@3-172.24.4.200:22-172.24.4.1:59446.service. Feb 12 20:37:55.086716 systemd[1]: sshd@2-172.24.4.200:22-172.24.4.1:35160.service: Deactivated successfully. Feb 12 20:37:55.088685 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:37:55.091845 systemd-logind[1049]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:37:55.094666 systemd-logind[1049]: Removed session 3. Feb 12 20:37:56.422034 sshd[1149]: Accepted publickey for core from 172.24.4.1 port 59446 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:37:56.425469 sshd[1149]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:37:56.435921 systemd[1]: Started session-4.scope. Feb 12 20:37:56.437098 systemd-logind[1049]: New session 4 of user core. Feb 12 20:37:57.178585 sshd[1149]: pam_unix(sshd:session): session closed for user core Feb 12 20:37:57.184995 systemd[1]: Started sshd@4-172.24.4.200:22-172.24.4.1:59460.service. Feb 12 20:37:57.189897 systemd[1]: sshd@3-172.24.4.200:22-172.24.4.1:59446.service: Deactivated successfully. Feb 12 20:37:57.191638 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:37:57.194626 systemd-logind[1049]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:37:57.197295 systemd-logind[1049]: Removed session 4. Feb 12 20:37:58.382541 sshd[1155]: Accepted publickey for core from 172.24.4.1 port 59460 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:37:58.386905 sshd[1155]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:37:58.399359 systemd-logind[1049]: New session 5 of user core. Feb 12 20:37:58.400306 systemd[1]: Started session-5.scope. Feb 12 20:37:58.946191 sudo[1159]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:37:58.946903 sudo[1159]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:37:58.959681 dbus-daemon[1036]: \xd0M\x8cwlU: received setenforce notice (enforcing=2144832320) Feb 12 20:37:58.965339 sudo[1159]: pam_unix(sudo:session): session closed for user root Feb 12 20:37:59.182030 sshd[1155]: pam_unix(sshd:session): session closed for user core Feb 12 20:37:59.183400 systemd[1]: Started sshd@5-172.24.4.200:22-172.24.4.1:59466.service. Feb 12 20:37:59.193466 systemd[1]: sshd@4-172.24.4.200:22-172.24.4.1:59460.service: Deactivated successfully. Feb 12 20:37:59.194517 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:37:59.196177 systemd-logind[1049]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:37:59.198157 systemd-logind[1049]: Removed session 5. Feb 12 20:38:00.509210 sshd[1162]: Accepted publickey for core from 172.24.4.1 port 59466 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:38:00.512484 sshd[1162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:38:00.522696 systemd-logind[1049]: New session 6 of user core. Feb 12 20:38:00.524966 systemd[1]: Started session-6.scope. Feb 12 20:38:01.172782 sudo[1167]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:38:01.173973 sudo[1167]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:38:01.180660 sudo[1167]: pam_unix(sudo:session): session closed for user root Feb 12 20:38:01.191179 sudo[1166]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:38:01.191717 sudo[1166]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:38:01.214009 systemd[1]: Stopping audit-rules.service... Feb 12 20:38:01.214000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:38:01.216925 auditctl[1170]: No rules Feb 12 20:38:01.218728 kernel: kauditd_printk_skb: 131 callbacks suppressed Feb 12 20:38:01.218872 kernel: audit: type=1305 audit(1707770281.214:174): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:38:01.214000 audit[1170]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff8f950210 a2=420 a3=0 items=0 ppid=1 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:01.235690 kernel: audit: type=1300 audit(1707770281.214:174): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff8f950210 a2=420 a3=0 items=0 ppid=1 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:01.235970 kernel: audit: type=1327 audit(1707770281.214:174): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:38:01.214000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:38:01.236451 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:38:01.237080 systemd[1]: Stopped audit-rules.service. Feb 12 20:38:01.239445 kernel: audit: type=1131 audit(1707770281.237:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.247002 systemd[1]: Starting audit-rules.service... Feb 12 20:38:01.290774 augenrules[1187]: No rules Feb 12 20:38:01.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.292428 systemd[1]: Finished audit-rules.service. Feb 12 20:38:01.304542 kernel: audit: type=1130 audit(1707770281.291:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.304669 kernel: audit: type=1106 audit(1707770281.301:177): pid=1166 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.301000 audit[1166]: USER_END pid=1166 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.302649 sudo[1166]: pam_unix(sudo:session): session closed for user root Feb 12 20:38:01.301000 audit[1166]: CRED_DISP pid=1166 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.322989 kernel: audit: type=1104 audit(1707770281.301:178): pid=1166 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.513429 sshd[1162]: pam_unix(sshd:session): session closed for user core Feb 12 20:38:01.516000 audit[1162]: USER_END pid=1162 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:01.534394 kernel: audit: type=1106 audit(1707770281.516:179): pid=1162 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:01.535510 systemd[1]: Started sshd@6-172.24.4.200:22-172.24.4.1:59478.service. Feb 12 20:38:01.539092 systemd[1]: sshd@5-172.24.4.200:22-172.24.4.1:59466.service: Deactivated successfully. Feb 12 20:38:01.542590 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:38:01.545041 systemd-logind[1049]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:38:01.517000 audit[1162]: CRED_DISP pid=1162 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:01.548975 systemd-logind[1049]: Removed session 6. Feb 12 20:38:01.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.200:22-172.24.4.1:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.567083 kernel: audit: type=1104 audit(1707770281.517:180): pid=1162 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:01.567205 kernel: audit: type=1130 audit(1707770281.534:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.200:22-172.24.4.1:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:01.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.200:22-172.24.4.1:59466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:02.893000 audit[1192]: USER_ACCT pid=1192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:02.895019 sshd[1192]: Accepted publickey for core from 172.24.4.1 port 59478 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:38:02.895000 audit[1192]: CRED_ACQ pid=1192 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:02.896000 audit[1192]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffceed7ea00 a2=3 a3=0 items=0 ppid=1 pid=1192 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:02.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:38:02.898520 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:38:02.909058 systemd-logind[1049]: New session 7 of user core. Feb 12 20:38:02.909908 systemd[1]: Started session-7.scope. Feb 12 20:38:02.920000 audit[1192]: USER_START pid=1192 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:02.923000 audit[1195]: CRED_ACQ pid=1195 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:03.378000 audit[1196]: USER_ACCT pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:03.379000 audit[1196]: CRED_REFR pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:03.380202 sudo[1196]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:38:03.380722 sudo[1196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:38:03.384000 audit[1196]: USER_START pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:04.416118 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:38:04.432054 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:38:04.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:04.435357 systemd[1]: Reached target network-online.target. Feb 12 20:38:04.440094 systemd[1]: Starting docker.service... Feb 12 20:38:04.534731 env[1212]: time="2024-02-12T20:38:04.534675240Z" level=info msg="Starting up" Feb 12 20:38:04.537507 env[1212]: time="2024-02-12T20:38:04.537487705Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:38:04.537579 env[1212]: time="2024-02-12T20:38:04.537564879Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:38:04.537659 env[1212]: time="2024-02-12T20:38:04.537641122Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:38:04.537721 env[1212]: time="2024-02-12T20:38:04.537708328Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:38:04.542037 env[1212]: time="2024-02-12T20:38:04.542016779Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 20:38:04.542124 env[1212]: time="2024-02-12T20:38:04.542110104Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 20:38:04.542192 env[1212]: time="2024-02-12T20:38:04.542176849Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 20:38:04.542275 env[1212]: time="2024-02-12T20:38:04.542260917Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 20:38:04.557903 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3175643995-merged.mount: Deactivated successfully. Feb 12 20:38:04.656365 env[1212]: time="2024-02-12T20:38:04.656179191Z" level=info msg="Loading containers: start." Feb 12 20:38:04.769000 audit[1243]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.769000 audit[1243]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd3e79acd0 a2=0 a3=7ffd3e79acbc items=0 ppid=1212 pid=1243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.769000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 20:38:04.773000 audit[1245]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.773000 audit[1245]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd5c4f2970 a2=0 a3=7ffd5c4f295c items=0 ppid=1212 pid=1245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 20:38:04.776000 audit[1247]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.776000 audit[1247]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe243ed4b0 a2=0 a3=7ffe243ed49c items=0 ppid=1212 pid=1247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.776000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:38:04.779000 audit[1249]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.779000 audit[1249]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdfa38ec70 a2=0 a3=7ffdfa38ec5c items=0 ppid=1212 pid=1249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.779000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:38:04.785000 audit[1251]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.785000 audit[1251]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffde40d85a0 a2=0 a3=7ffde40d858c items=0 ppid=1212 pid=1251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 20:38:04.804000 audit[1256]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.804000 audit[1256]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc7f9f9c0 a2=0 a3=7ffcc7f9f9ac items=0 ppid=1212 pid=1256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 20:38:04.818000 audit[1258]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.818000 audit[1258]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffed892cd50 a2=0 a3=7ffed892cd3c items=0 ppid=1212 pid=1258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 20:38:04.822000 audit[1260]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.822000 audit[1260]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd213d2c20 a2=0 a3=7ffd213d2c0c items=0 ppid=1212 pid=1260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 20:38:04.824000 audit[1262]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.824000 audit[1262]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc8a61aa70 a2=0 a3=7ffc8a61aa5c items=0 ppid=1212 pid=1262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.824000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:38:04.842000 audit[1266]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.842000 audit[1266]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffea1b6b830 a2=0 a3=7ffea1b6b81c items=0 ppid=1212 pid=1266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.842000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:38:04.844000 audit[1267]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.844000 audit[1267]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc082e4990 a2=0 a3=7ffc082e497c items=0 ppid=1212 pid=1267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:38:04.865465 kernel: Initializing XFRM netlink socket Feb 12 20:38:04.943115 env[1212]: time="2024-02-12T20:38:04.943013759Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 20:38:04.990000 audit[1275]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:04.990000 audit[1275]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffed992f2d0 a2=0 a3=7ffed992f2bc items=0 ppid=1212 pid=1275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:04.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 20:38:05.011000 audit[1278]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.011000 audit[1278]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffa677ff10 a2=0 a3=7fffa677fefc items=0 ppid=1212 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.011000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 20:38:05.015000 audit[1281]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.015000 audit[1281]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd00bfe0d0 a2=0 a3=7ffd00bfe0bc items=0 ppid=1212 pid=1281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 20:38:05.017000 audit[1283]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.017000 audit[1283]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca10c71c0 a2=0 a3=7ffca10c71ac items=0 ppid=1212 pid=1283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.017000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 20:38:05.020000 audit[1285]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.020000 audit[1285]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd84a62430 a2=0 a3=7ffd84a6241c items=0 ppid=1212 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.020000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 20:38:05.024000 audit[1287]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.024000 audit[1287]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe693787d0 a2=0 a3=7ffe693787bc items=0 ppid=1212 pid=1287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 20:38:05.027000 audit[1289]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.027000 audit[1289]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc2cd1e490 a2=0 a3=7ffc2cd1e47c items=0 ppid=1212 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.027000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 20:38:05.046000 audit[1292]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.046000 audit[1292]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe3c390f20 a2=0 a3=7ffe3c390f0c items=0 ppid=1212 pid=1292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 20:38:05.052000 audit[1294]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.052000 audit[1294]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff57916440 a2=0 a3=7fff5791642c items=0 ppid=1212 pid=1294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 20:38:05.057000 audit[1296]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.057000 audit[1296]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffccada2a80 a2=0 a3=7ffccada2a6c items=0 ppid=1212 pid=1296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 20:38:05.061000 audit[1298]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.061000 audit[1298]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd5403e0c0 a2=0 a3=7ffd5403e0ac items=0 ppid=1212 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 20:38:05.064147 systemd-networkd[975]: docker0: Link UP Feb 12 20:38:05.071000 audit[1302]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.071000 audit[1302]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8603a570 a2=0 a3=7ffd8603a55c items=0 ppid=1212 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.071000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:38:05.072000 audit[1303]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:05.072000 audit[1303]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fffae20eeb0 a2=0 a3=7fffae20ee9c items=0 ppid=1212 pid=1303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:05.072000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 20:38:05.074672 env[1212]: time="2024-02-12T20:38:05.074635776Z" level=info msg="Loading containers: done." Feb 12 20:38:05.090368 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3671425403-merged.mount: Deactivated successfully. Feb 12 20:38:05.110257 env[1212]: time="2024-02-12T20:38:05.110085291Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 20:38:05.110566 env[1212]: time="2024-02-12T20:38:05.110508966Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 20:38:05.110796 env[1212]: time="2024-02-12T20:38:05.110737475Z" level=info msg="Daemon has completed initialization" Feb 12 20:38:05.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:05.147018 systemd[1]: Started docker.service. Feb 12 20:38:05.168092 env[1212]: time="2024-02-12T20:38:05.167995542Z" level=info msg="API listen on /run/docker.sock" Feb 12 20:38:05.213869 systemd[1]: Reloading. Feb 12 20:38:05.315507 /usr/lib/systemd/system-generators/torcx-generator[1350]: time="2024-02-12T20:38:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:38:05.315923 /usr/lib/systemd/system-generators/torcx-generator[1350]: time="2024-02-12T20:38:05Z" level=info msg="torcx already run" Feb 12 20:38:05.399767 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:38:05.399983 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:38:05.422785 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit: BPF prog-id=37 op=LOAD Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.500000 audit: BPF prog-id=38 op=LOAD Feb 12 20:38:05.500000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:38:05.500000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.502000 audit: BPF prog-id=39 op=LOAD Feb 12 20:38:05.503000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.504000 audit: BPF prog-id=40 op=LOAD Feb 12 20:38:05.504000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit: BPF prog-id=41 op=LOAD Feb 12 20:38:05.507000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.507000 audit: BPF prog-id=42 op=LOAD Feb 12 20:38:05.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.508000 audit: BPF prog-id=43 op=LOAD Feb 12 20:38:05.508000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:38:05.508000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:38:05.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.510000 audit: BPF prog-id=44 op=LOAD Feb 12 20:38:05.510000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit: BPF prog-id=45 op=LOAD Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit: BPF prog-id=46 op=LOAD Feb 12 20:38:05.512000 audit: BPF prog-id=33 op=UNLOAD Feb 12 20:38:05.512000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit: BPF prog-id=47 op=LOAD Feb 12 20:38:05.513000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit: BPF prog-id=48 op=LOAD Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.514000 audit: BPF prog-id=49 op=LOAD Feb 12 20:38:05.514000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:38:05.514000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.518000 audit: BPF prog-id=50 op=LOAD Feb 12 20:38:05.518000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:05.520000 audit: BPF prog-id=51 op=LOAD Feb 12 20:38:05.520000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:38:05.550403 systemd[1]: Started kubelet.service. Feb 12 20:38:05.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:05.655412 kubelet[1397]: E0212 20:38:05.655270 1397 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:38:05.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:38:05.660872 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:38:05.661005 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:38:06.634855 env[1059]: time="2024-02-12T20:38:06.634754378Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 20:38:07.504283 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3223731580.mount: Deactivated successfully. Feb 12 20:38:10.355260 env[1059]: time="2024-02-12T20:38:10.354990580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:10.361212 env[1059]: time="2024-02-12T20:38:10.361142147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:10.364310 env[1059]: time="2024-02-12T20:38:10.364257370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:10.365670 env[1059]: time="2024-02-12T20:38:10.365611449Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 12 20:38:10.367937 env[1059]: time="2024-02-12T20:38:10.366508091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:10.389658 env[1059]: time="2024-02-12T20:38:10.389593127Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 20:38:13.289489 env[1059]: time="2024-02-12T20:38:13.289394644Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:13.292582 env[1059]: time="2024-02-12T20:38:13.292546064Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:13.295134 env[1059]: time="2024-02-12T20:38:13.295098331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:13.297551 env[1059]: time="2024-02-12T20:38:13.297522498Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:13.298481 env[1059]: time="2024-02-12T20:38:13.298448825Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 12 20:38:13.312771 env[1059]: time="2024-02-12T20:38:13.312717416Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 20:38:15.201161 env[1059]: time="2024-02-12T20:38:15.201080530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:15.203318 env[1059]: time="2024-02-12T20:38:15.203269506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:15.206579 env[1059]: time="2024-02-12T20:38:15.206552323Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:15.208710 env[1059]: time="2024-02-12T20:38:15.208656639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:15.210118 env[1059]: time="2024-02-12T20:38:15.210055944Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 12 20:38:15.229844 env[1059]: time="2024-02-12T20:38:15.229780487Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 20:38:15.916755 kernel: kauditd_printk_skb: 259 callbacks suppressed Feb 12 20:38:15.916896 kernel: audit: type=1130 audit(1707770295.910:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:15.916931 kernel: audit: type=1131 audit(1707770295.910:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:15.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:15.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:15.911898 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 20:38:15.912133 systemd[1]: Stopped kubelet.service. Feb 12 20:38:15.916469 systemd[1]: Started kubelet.service. Feb 12 20:38:15.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:15.925243 kernel: audit: type=1130 audit(1707770295.915:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:16.063454 kubelet[1431]: E0212 20:38:16.063392 1431 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:38:16.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:38:16.066773 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:38:16.066919 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:38:16.071274 kernel: audit: type=1131 audit(1707770296.065:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:38:16.672382 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3101249612.mount: Deactivated successfully. Feb 12 20:38:17.488644 env[1059]: time="2024-02-12T20:38:17.488503622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:17.491908 env[1059]: time="2024-02-12T20:38:17.491862962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:17.495157 env[1059]: time="2024-02-12T20:38:17.495120963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:17.498375 env[1059]: time="2024-02-12T20:38:17.498332877Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:17.499917 env[1059]: time="2024-02-12T20:38:17.499852256Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 20:38:17.522383 env[1059]: time="2024-02-12T20:38:17.522294637Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 20:38:18.137673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3196417018.mount: Deactivated successfully. Feb 12 20:38:18.150526 env[1059]: time="2024-02-12T20:38:18.150458768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:18.155188 env[1059]: time="2024-02-12T20:38:18.155132384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:18.158287 env[1059]: time="2024-02-12T20:38:18.158168829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:18.161958 env[1059]: time="2024-02-12T20:38:18.161848600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:18.163907 env[1059]: time="2024-02-12T20:38:18.163806202Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 20:38:18.190841 env[1059]: time="2024-02-12T20:38:18.190764903Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 20:38:19.204276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1030757048.mount: Deactivated successfully. Feb 12 20:38:25.653036 env[1059]: time="2024-02-12T20:38:25.652960004Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:25.656195 env[1059]: time="2024-02-12T20:38:25.656150564Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:25.660577 env[1059]: time="2024-02-12T20:38:25.660521330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:25.663093 env[1059]: time="2024-02-12T20:38:25.663046188Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:25.664683 env[1059]: time="2024-02-12T20:38:25.664640101Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 12 20:38:25.689420 env[1059]: time="2024-02-12T20:38:25.689360205Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 20:38:26.230722 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 20:38:26.241495 kernel: audit: type=1130 audit(1707770306.230:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:26.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:26.231353 systemd[1]: Stopped kubelet.service. Feb 12 20:38:26.235026 systemd[1]: Started kubelet.service. Feb 12 20:38:26.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:26.252291 kernel: audit: type=1131 audit(1707770306.230:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:26.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:26.265278 kernel: audit: type=1130 audit(1707770306.230:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:26.309056 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4073257719.mount: Deactivated successfully. Feb 12 20:38:26.396507 kubelet[1453]: E0212 20:38:26.396458 1453 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 20:38:26.398327 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:38:26.398517 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:38:26.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:38:26.403273 kernel: audit: type=1131 audit(1707770306.397:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:38:27.780159 env[1059]: time="2024-02-12T20:38:27.778961776Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:27.782354 env[1059]: time="2024-02-12T20:38:27.782296514Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:27.786560 env[1059]: time="2024-02-12T20:38:27.786502016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:27.792033 env[1059]: time="2024-02-12T20:38:27.791967646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:27.797930 env[1059]: time="2024-02-12T20:38:27.797866130Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 20:38:31.421634 update_engine[1050]: I0212 20:38:31.421149 1050 update_attempter.cc:509] Updating boot flags... Feb 12 20:38:32.544571 systemd[1]: Stopped kubelet.service. Feb 12 20:38:32.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:32.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:32.562298 kernel: audit: type=1130 audit(1707770312.543:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:32.562451 kernel: audit: type=1131 audit(1707770312.543:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:32.599956 systemd[1]: Reloading. Feb 12 20:38:32.722143 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2024-02-12T20:38:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:38:32.722548 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2024-02-12T20:38:32Z" level=info msg="torcx already run" Feb 12 20:38:32.821890 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:38:32.821909 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:38:32.874846 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972895 kernel: audit: type=1400 audit(1707770312.956:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972946 kernel: audit: type=1400 audit(1707770312.956:402): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972973 kernel: audit: type=1400 audit(1707770312.956:403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.981203 kernel: audit: type=1400 audit(1707770312.956:404): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.999381 kernel: audit: type=1400 audit(1707770312.956:405): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007692 kernel: audit: type=1400 audit(1707770312.956:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015724 kernel: audit: type=1400 audit(1707770312.956:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit: BPF prog-id=52 op=LOAD Feb 12 20:38:33.016333 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.970000 audit: BPF prog-id=53 op=LOAD Feb 12 20:38:32.972000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:38:32.972000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.989000 audit: BPF prog-id=54 op=LOAD Feb 12 20:38:32.989000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:32.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit: BPF prog-id=55 op=LOAD Feb 12 20:38:33.007000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit: BPF prog-id=56 op=LOAD Feb 12 20:38:33.015000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit: BPF prog-id=57 op=LOAD Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.015000 audit: BPF prog-id=58 op=LOAD Feb 12 20:38:33.015000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:38:33.015000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit: BPF prog-id=59 op=LOAD Feb 12 20:38:33.017000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.017000 audit: BPF prog-id=60 op=LOAD Feb 12 20:38:33.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.018000 audit: BPF prog-id=62 op=LOAD Feb 12 20:38:33.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.021000 audit: BPF prog-id=65 op=LOAD Feb 12 20:38:33.021000 audit: BPF prog-id=50 op=UNLOAD Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.022000 audit: BPF prog-id=66 op=LOAD Feb 12 20:38:33.022000 audit: BPF prog-id=51 op=UNLOAD Feb 12 20:38:33.053370 systemd[1]: Started kubelet.service. Feb 12 20:38:33.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:33.121273 kubelet[1604]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:38:33.125334 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:38:33.125334 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:38:33.125459 kubelet[1604]: I0212 20:38:33.125419 1604 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:38:33.648749 kubelet[1604]: I0212 20:38:33.648701 1604 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:38:33.648749 kubelet[1604]: I0212 20:38:33.648727 1604 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:38:33.648990 kubelet[1604]: I0212 20:38:33.648932 1604 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:38:33.655481 kubelet[1604]: I0212 20:38:33.655436 1604 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:38:33.655653 kubelet[1604]: I0212 20:38:33.655634 1604 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:38:33.655733 kubelet[1604]: I0212 20:38:33.655717 1604 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:38:33.655733 kubelet[1604]: I0212 20:38:33.655734 1604 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:38:33.655974 kubelet[1604]: I0212 20:38:33.655746 1604 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:38:33.655974 kubelet[1604]: I0212 20:38:33.655849 1604 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:38:33.658036 kubelet[1604]: I0212 20:38:33.658002 1604 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:38:33.659295 kubelet[1604]: E0212 20:38:33.658367 1604 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.200:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.664461 kubelet[1604]: I0212 20:38:33.664441 1604 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:38:33.664642 kubelet[1604]: I0212 20:38:33.664630 1604 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:38:33.664743 kubelet[1604]: I0212 20:38:33.664732 1604 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:38:33.664845 kubelet[1604]: I0212 20:38:33.664835 1604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:38:33.665299 kubelet[1604]: W0212 20:38:33.665147 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.200:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6-02325721ca.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.665358 kubelet[1604]: E0212 20:38:33.665333 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.200:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6-02325721ca.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.665889 kubelet[1604]: I0212 20:38:33.665864 1604 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:38:33.666191 kubelet[1604]: W0212 20:38:33.666179 1604 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:38:33.667174 kubelet[1604]: I0212 20:38:33.667138 1604 server.go:1168] "Started kubelet" Feb 12 20:38:33.670692 kubelet[1604]: I0212 20:38:33.670626 1604 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:38:33.672605 kubelet[1604]: I0212 20:38:33.672572 1604 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:38:33.671000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.671000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:38:33.671000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e22b10 a1=c000dfdcc8 a2=c000e22ae0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.671000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:38:33.673323 kubelet[1604]: I0212 20:38:33.673310 1604 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:38:33.672000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.672000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:38:33.672000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e31060 a1=c000dfdce0 a2=c000e22ba0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.672000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:38:33.674289 kubelet[1604]: I0212 20:38:33.674275 1604 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:38:33.674464 kubelet[1604]: I0212 20:38:33.674452 1604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:38:33.680942 kubelet[1604]: I0212 20:38:33.680907 1604 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:38:33.683449 kubelet[1604]: I0212 20:38:33.681608 1604 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:38:33.684830 kubelet[1604]: I0212 20:38:33.681627 1604 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:38:33.685619 kubelet[1604]: E0212 20:38:33.685605 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.200:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6-02325721ca.novalocal?timeout=10s\": dial tcp 172.24.4.200:6443: connect: connection refused" interval="200ms" Feb 12 20:38:33.687838 kubelet[1604]: E0212 20:38:33.682047 1604 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:38:33.690332 kubelet[1604]: W0212 20:38:33.682485 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.200:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.690332 kubelet[1604]: W0212 20:38:33.686104 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.200:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.690332 kubelet[1604]: E0212 20:38:33.687956 1604 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-2-6-02325721ca.novalocal.17b3380d5815cc58", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-2-6-02325721ca.novalocal", UID:"ci-3510-3-2-6-02325721ca.novalocal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-2-6-02325721ca.novalocal"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 38, 33, 667103832, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 38, 33, 667103832, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://172.24.4.200:6443/api/v1/namespaces/default/events": dial tcp 172.24.4.200:6443: connect: connection refused'(may retry after sleeping) Feb 12 20:38:33.690554 kubelet[1604]: E0212 20:38:33.690367 1604 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:38:33.690554 kubelet[1604]: E0212 20:38:33.690424 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.200:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.690554 kubelet[1604]: E0212 20:38:33.690459 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.200:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.691000 audit[1615]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.691000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc39448ad0 a2=0 a3=7ffc39448abc items=0 ppid=1604 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.691000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:38:33.695000 audit[1617]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.695000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdde1089d0 a2=0 a3=7ffdde1089bc items=0 ppid=1604 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.695000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:38:33.702000 audit[1620]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.702000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6d6e3780 a2=0 a3=7ffd6d6e376c items=0 ppid=1604 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.702000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:38:33.704000 audit[1622]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.704000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc81b990c0 a2=0 a3=7ffc81b990ac items=0 ppid=1604 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:38:33.720000 audit[1625]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.720000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff98666960 a2=0 a3=7fff9866694c items=0 ppid=1604 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:38:33.722262 kubelet[1604]: I0212 20:38:33.722246 1604 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:38:33.722000 audit[1627]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1627 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.722000 audit[1627]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffb544300 a2=0 a3=7ffffb5442ec items=0 ppid=1604 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:38:33.724000 audit[1630]: NETFILTER_CFG table=nat:32 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.724000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc07c4f660 a2=0 a3=7ffc07c4f64c items=0 ppid=1604 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:38:33.725000 audit[1626]: NETFILTER_CFG table=mangle:33 family=10 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:33.725000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc9702100 a2=0 a3=7fffc97020ec items=0 ppid=1604 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.725000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:38:33.727169 kubelet[1604]: I0212 20:38:33.727152 1604 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:38:33.727303 kubelet[1604]: I0212 20:38:33.727291 1604 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:38:33.727391 kubelet[1604]: I0212 20:38:33.727380 1604 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:38:33.727508 kubelet[1604]: E0212 20:38:33.727497 1604 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:38:33.728016 kubelet[1604]: W0212 20:38:33.727998 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.200:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.728098 kubelet[1604]: E0212 20:38:33.728088 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.200:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:33.727000 audit[1631]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:33.727000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed52f3ec0 a2=0 a3=10e3 items=0 ppid=1604 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:38:33.729000 audit[1632]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:33.729000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff4445f900 a2=0 a3=7fff4445f8ec items=0 ppid=1604 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:38:33.730000 audit[1633]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:33.730000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc78225460 a2=0 a3=7ffc7822544c items=0 ppid=1604 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.730000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:38:33.731000 audit[1634]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:33.731000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc3777c550 a2=0 a3=7ffc3777c53c items=0 ppid=1604 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:38:33.736352 kubelet[1604]: I0212 20:38:33.736281 1604 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:38:33.736427 kubelet[1604]: I0212 20:38:33.736364 1604 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:38:33.736427 kubelet[1604]: I0212 20:38:33.736392 1604 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:38:33.745075 kubelet[1604]: I0212 20:38:33.745015 1604 policy_none.go:49] "None policy: Start" Feb 12 20:38:33.745610 kubelet[1604]: I0212 20:38:33.745598 1604 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:38:33.745692 kubelet[1604]: I0212 20:38:33.745682 1604 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:38:33.758941 systemd[1]: Created slice kubepods.slice. Feb 12 20:38:33.764926 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:38:33.768297 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:38:33.775091 kubelet[1604]: I0212 20:38:33.775059 1604 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:38:33.773000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:33.773000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:38:33.773000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d13080 a1=c000d0b758 a2=c000d13050 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:33.773000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:38:33.775425 kubelet[1604]: I0212 20:38:33.775189 1604 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:38:33.775549 kubelet[1604]: I0212 20:38:33.775513 1604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:38:33.776582 kubelet[1604]: E0212 20:38:33.776553 1604 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-2-6-02325721ca.novalocal\" not found" Feb 12 20:38:33.784411 kubelet[1604]: I0212 20:38:33.784380 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.784906 kubelet[1604]: E0212 20:38:33.784874 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.200:6443/api/v1/nodes\": dial tcp 172.24.4.200:6443: connect: connection refused" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.828520 kubelet[1604]: I0212 20:38:33.828457 1604 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:33.831994 kubelet[1604]: I0212 20:38:33.831955 1604 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:33.835466 kubelet[1604]: I0212 20:38:33.835216 1604 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:33.847813 systemd[1]: Created slice kubepods-burstable-pod926e3e41f8e4557e8bf7a280e131e1c1.slice. Feb 12 20:38:33.861533 systemd[1]: Created slice kubepods-burstable-pod67d05bbb47d4ca3ac0af06e4d6785cd7.slice. Feb 12 20:38:33.876306 systemd[1]: Created slice kubepods-burstable-pod59c941429f70187406dbe6dd8213d87e.slice. Feb 12 20:38:33.886615 kubelet[1604]: I0212 20:38:33.886576 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.887017 kubelet[1604]: I0212 20:38:33.886988 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.887404 kubelet[1604]: I0212 20:38:33.887376 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/59c941429f70187406dbe6dd8213d87e-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"59c941429f70187406dbe6dd8213d87e\") " pod="kube-system/kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.887708 kubelet[1604]: I0212 20:38:33.887682 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/926e3e41f8e4557e8bf7a280e131e1c1-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"926e3e41f8e4557e8bf7a280e131e1c1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.888011 kubelet[1604]: I0212 20:38:33.887985 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/926e3e41f8e4557e8bf7a280e131e1c1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"926e3e41f8e4557e8bf7a280e131e1c1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.888327 kubelet[1604]: I0212 20:38:33.888299 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.888618 kubelet[1604]: I0212 20:38:33.888593 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.888998 kubelet[1604]: I0212 20:38:33.888971 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.889344 kubelet[1604]: I0212 20:38:33.889316 1604 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/926e3e41f8e4557e8bf7a280e131e1c1-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"926e3e41f8e4557e8bf7a280e131e1c1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.891180 kubelet[1604]: E0212 20:38:33.891148 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.200:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6-02325721ca.novalocal?timeout=10s\": dial tcp 172.24.4.200:6443: connect: connection refused" interval="400ms" Feb 12 20:38:33.989053 kubelet[1604]: I0212 20:38:33.988987 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:33.990399 kubelet[1604]: E0212 20:38:33.990372 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.200:6443/api/v1/nodes\": dial tcp 172.24.4.200:6443: connect: connection refused" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:34.161399 env[1059]: time="2024-02-12T20:38:34.160591807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal,Uid:926e3e41f8e4557e8bf7a280e131e1c1,Namespace:kube-system,Attempt:0,}" Feb 12 20:38:34.172903 env[1059]: time="2024-02-12T20:38:34.172810517Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal,Uid:67d05bbb47d4ca3ac0af06e4d6785cd7,Namespace:kube-system,Attempt:0,}" Feb 12 20:38:34.182611 env[1059]: time="2024-02-12T20:38:34.182539118Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal,Uid:59c941429f70187406dbe6dd8213d87e,Namespace:kube-system,Attempt:0,}" Feb 12 20:38:34.292946 kubelet[1604]: E0212 20:38:34.292794 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.200:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6-02325721ca.novalocal?timeout=10s\": dial tcp 172.24.4.200:6443: connect: connection refused" interval="800ms" Feb 12 20:38:34.393860 kubelet[1604]: I0212 20:38:34.393816 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:34.394506 kubelet[1604]: E0212 20:38:34.394438 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.200:6443/api/v1/nodes\": dial tcp 172.24.4.200:6443: connect: connection refused" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:34.472770 kubelet[1604]: W0212 20:38:34.472605 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://172.24.4.200:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6-02325721ca.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.472770 kubelet[1604]: E0212 20:38:34.472769 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.200:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-2-6-02325721ca.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.580343 kubelet[1604]: W0212 20:38:34.580003 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://172.24.4.200:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.580343 kubelet[1604]: E0212 20:38:34.580087 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.200:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.626762 kubelet[1604]: W0212 20:38:34.626685 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://172.24.4.200:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.626762 kubelet[1604]: E0212 20:38:34.626772 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.200:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.629700 kubelet[1604]: W0212 20:38:34.629645 1604 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://172.24.4.200:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.629834 kubelet[1604]: E0212 20:38:34.629707 1604 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.200:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:34.837617 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4125966809.mount: Deactivated successfully. Feb 12 20:38:34.857035 env[1059]: time="2024-02-12T20:38:34.856949763Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.868463 env[1059]: time="2024-02-12T20:38:34.867723541Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.871593 env[1059]: time="2024-02-12T20:38:34.871531924Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.874552 env[1059]: time="2024-02-12T20:38:34.874465389Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.878200 env[1059]: time="2024-02-12T20:38:34.878142037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.887492 env[1059]: time="2024-02-12T20:38:34.887435296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.890023 env[1059]: time="2024-02-12T20:38:34.889968786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.892001 env[1059]: time="2024-02-12T20:38:34.891944826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.894044 env[1059]: time="2024-02-12T20:38:34.893992891Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.902261 env[1059]: time="2024-02-12T20:38:34.902147551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.905385 env[1059]: time="2024-02-12T20:38:34.905307797Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.932917 env[1059]: time="2024-02-12T20:38:34.932821946Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:34.948091 env[1059]: time="2024-02-12T20:38:34.948002311Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:38:34.948844 env[1059]: time="2024-02-12T20:38:34.948723735Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:38:34.949005 env[1059]: time="2024-02-12T20:38:34.948886929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:38:34.949404 env[1059]: time="2024-02-12T20:38:34.949331457Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b6ce12ee1b779a1da7e8aafddf05c9ff02c6b42c8e3c78e73bb467b8b8a943d9 pid=1643 runtime=io.containerd.runc.v2 Feb 12 20:38:34.979505 systemd[1]: Started cri-containerd-b6ce12ee1b779a1da7e8aafddf05c9ff02c6b42c8e3c78e73bb467b8b8a943d9.scope. Feb 12 20:38:35.009863 env[1059]: time="2024-02-12T20:38:35.009786891Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:38:35.010049 env[1059]: time="2024-02-12T20:38:35.009828288Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:38:35.010049 env[1059]: time="2024-02-12T20:38:35.010030344Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:38:35.012272 env[1059]: time="2024-02-12T20:38:35.010299737Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80c756b3b547e9e13471fa7a2133ba01d6bca45e60f1a60728b67177f82a8dac pid=1670 runtime=io.containerd.runc.v2 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit: BPF prog-id=67 op=LOAD Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636531326565316237373961316461376538616166646466303563 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636531326565316237373961316461376538616166646466303563 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.020000 audit: BPF prog-id=68 op=LOAD Feb 12 20:38:35.020000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00021a350 items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636531326565316237373961316461376538616166646466303563 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit: BPF prog-id=69 op=LOAD Feb 12 20:38:35.022000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00021a398 items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636531326565316237373961316461376538616166646466303563 Feb 12 20:38:35.022000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:38:35.022000 audit: BPF prog-id=68 op=UNLOAD Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.022000 audit: BPF prog-id=70 op=LOAD Feb 12 20:38:35.022000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00021a7a8 items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236636531326565316237373961316461376538616166646466303563 Feb 12 20:38:35.034635 env[1059]: time="2024-02-12T20:38:35.034522705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:38:35.036277 env[1059]: time="2024-02-12T20:38:35.034576255Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:38:35.036277 env[1059]: time="2024-02-12T20:38:35.034877215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:38:35.036277 env[1059]: time="2024-02-12T20:38:35.035014842Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7a91ba545d282507062b61a6970d24a9f790b9afa7f1ed484f8e3423db0bf45 pid=1694 runtime=io.containerd.runc.v2 Feb 12 20:38:35.048820 systemd[1]: Started cri-containerd-80c756b3b547e9e13471fa7a2133ba01d6bca45e60f1a60728b67177f82a8dac.scope. Feb 12 20:38:35.070667 systemd[1]: Started cri-containerd-f7a91ba545d282507062b61a6970d24a9f790b9afa7f1ed484f8e3423db0bf45.scope. Feb 12 20:38:35.085286 env[1059]: time="2024-02-12T20:38:35.085190752Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal,Uid:67d05bbb47d4ca3ac0af06e4d6785cd7,Namespace:kube-system,Attempt:0,} returns sandbox id \"b6ce12ee1b779a1da7e8aafddf05c9ff02c6b42c8e3c78e73bb467b8b8a943d9\"" Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.092000 audit: BPF prog-id=71 op=LOAD Feb 12 20:38:35.096892 kubelet[1604]: E0212 20:38:35.095198 1604 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.200:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-2-6-02325721ca.novalocal?timeout=10s\": dial tcp 172.24.4.200:6443: connect: connection refused" interval="1.6s" Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=1694 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613931626135343564323832353037303632623631613639373064 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=1694 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613931626135343564323832353037303632623631613639373064 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit: BPF prog-id=72 op=LOAD Feb 12 20:38:35.096000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002c4790 items=0 ppid=1694 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613931626135343564323832353037303632623631613639373064 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit: BPF prog-id=73 op=LOAD Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0002c47d8 items=0 ppid=1694 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613931626135343564323832353037303632623631613639373064 Feb 12 20:38:35.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:38:35.097000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { perfmon } for pid=1708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit: BPF prog-id=74 op=LOAD Feb 12 20:38:35.097000 audit[1708]: AVC avc: denied { bpf } for pid=1708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.097000 audit: BPF prog-id=75 op=LOAD Feb 12 20:38:35.097000 audit[1708]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0002c4be8 items=0 ppid=1694 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637613931626135343564323832353037303632623631613639373064 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1670 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633735366233623534376539653133343731666137613231333362 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1670 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633735366233623534376539653133343731666137613231333362 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit: BPF prog-id=76 op=LOAD Feb 12 20:38:35.098000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028ed70 items=0 ppid=1670 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633735366233623534376539653133343731666137613231333362 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit: BPF prog-id=77 op=LOAD Feb 12 20:38:35.098000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028edb8 items=0 ppid=1670 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633735366233623534376539653133343731666137613231333362 Feb 12 20:38:35.098000 audit: BPF prog-id=77 op=UNLOAD Feb 12 20:38:35.098000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { perfmon } for pid=1688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit[1688]: AVC avc: denied { bpf } for pid=1688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.098000 audit: BPF prog-id=78 op=LOAD Feb 12 20:38:35.098000 audit[1688]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028f1c8 items=0 ppid=1670 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830633735366233623534376539653133343731666137613231333362 Feb 12 20:38:35.112395 env[1059]: time="2024-02-12T20:38:35.109088043Z" level=info msg="CreateContainer within sandbox \"b6ce12ee1b779a1da7e8aafddf05c9ff02c6b42c8e3c78e73bb467b8b8a943d9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 20:38:35.137270 env[1059]: time="2024-02-12T20:38:35.136482201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal,Uid:59c941429f70187406dbe6dd8213d87e,Namespace:kube-system,Attempt:0,} returns sandbox id \"f7a91ba545d282507062b61a6970d24a9f790b9afa7f1ed484f8e3423db0bf45\"" Feb 12 20:38:35.140264 env[1059]: time="2024-02-12T20:38:35.140198105Z" level=info msg="CreateContainer within sandbox \"f7a91ba545d282507062b61a6970d24a9f790b9afa7f1ed484f8e3423db0bf45\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 20:38:35.145234 env[1059]: time="2024-02-12T20:38:35.144795502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal,Uid:926e3e41f8e4557e8bf7a280e131e1c1,Namespace:kube-system,Attempt:0,} returns sandbox id \"80c756b3b547e9e13471fa7a2133ba01d6bca45e60f1a60728b67177f82a8dac\"" Feb 12 20:38:35.148153 env[1059]: time="2024-02-12T20:38:35.148122102Z" level=info msg="CreateContainer within sandbox \"80c756b3b547e9e13471fa7a2133ba01d6bca45e60f1a60728b67177f82a8dac\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 20:38:35.187343 env[1059]: time="2024-02-12T20:38:35.187300908Z" level=info msg="CreateContainer within sandbox \"b6ce12ee1b779a1da7e8aafddf05c9ff02c6b42c8e3c78e73bb467b8b8a943d9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e83631418eabf68b8676d9be8d99b87bdb1d7f3a381c90c1a48af26accfd4ada\"" Feb 12 20:38:35.189505 env[1059]: time="2024-02-12T20:38:35.189422623Z" level=info msg="StartContainer for \"e83631418eabf68b8676d9be8d99b87bdb1d7f3a381c90c1a48af26accfd4ada\"" Feb 12 20:38:35.197763 kubelet[1604]: I0212 20:38:35.197454 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:35.198524 kubelet[1604]: E0212 20:38:35.198452 1604 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://172.24.4.200:6443/api/v1/nodes\": dial tcp 172.24.4.200:6443: connect: connection refused" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:35.219877 env[1059]: time="2024-02-12T20:38:35.219737763Z" level=info msg="CreateContainer within sandbox \"f7a91ba545d282507062b61a6970d24a9f790b9afa7f1ed484f8e3423db0bf45\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"6d2a10a67fca84fb17261ee7233ae08d0a54a3c66fc067ffd38f211f1478d1d9\"" Feb 12 20:38:35.221426 env[1059]: time="2024-02-12T20:38:35.221373792Z" level=info msg="StartContainer for \"6d2a10a67fca84fb17261ee7233ae08d0a54a3c66fc067ffd38f211f1478d1d9\"" Feb 12 20:38:35.228760 env[1059]: time="2024-02-12T20:38:35.228706976Z" level=info msg="CreateContainer within sandbox \"80c756b3b547e9e13471fa7a2133ba01d6bca45e60f1a60728b67177f82a8dac\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d315d41aa008b5ec08d5eb5e5bd5a78a53cda43fbb7e9ecf68503cf1ae21ec9c\"" Feb 12 20:38:35.229848 env[1059]: time="2024-02-12T20:38:35.229809050Z" level=info msg="StartContainer for \"d315d41aa008b5ec08d5eb5e5bd5a78a53cda43fbb7e9ecf68503cf1ae21ec9c\"" Feb 12 20:38:35.244445 systemd[1]: Started cri-containerd-e83631418eabf68b8676d9be8d99b87bdb1d7f3a381c90c1a48af26accfd4ada.scope. Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.263000 audit: BPF prog-id=79 op=LOAD Feb 12 20:38:35.264000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.264000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1643 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538333633313431386561626636386238363736643962653864393962 Feb 12 20:38:35.264000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.264000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1643 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538333633313431386561626636386238363736643962653864393962 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit: BPF prog-id=80 op=LOAD Feb 12 20:38:35.265000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027d640 items=0 ppid=1643 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538333633313431386561626636386238363736643962653864393962 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.265000 audit: BPF prog-id=81 op=LOAD Feb 12 20:38:35.265000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027d688 items=0 ppid=1643 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538333633313431386561626636386238363736643962653864393962 Feb 12 20:38:35.266000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:38:35.266000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { perfmon } for pid=1769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit[1769]: AVC avc: denied { bpf } for pid=1769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.266000 audit: BPF prog-id=82 op=LOAD Feb 12 20:38:35.266000 audit[1769]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027da98 items=0 ppid=1643 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538333633313431386561626636386238363736643962653864393962 Feb 12 20:38:35.281534 systemd[1]: Started cri-containerd-d315d41aa008b5ec08d5eb5e5bd5a78a53cda43fbb7e9ecf68503cf1ae21ec9c.scope. Feb 12 20:38:35.296625 systemd[1]: Started cri-containerd-6d2a10a67fca84fb17261ee7233ae08d0a54a3c66fc067ffd38f211f1478d1d9.scope. Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.321000 audit: BPF prog-id=83 op=LOAD Feb 12 20:38:35.322000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.322000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.322000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313564343161613030386235656330386435656235653562643561 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313564343161613030386235656330386435656235653562643561 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.323000 audit: BPF prog-id=84 op=LOAD Feb 12 20:38:35.323000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2f10 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313564343161613030386235656330386435656235653562643561 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.324000 audit: BPF prog-id=85 op=LOAD Feb 12 20:38:35.324000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c2f58 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313564343161613030386235656330386435656235653562643561 Feb 12 20:38:35.325000 audit: BPF prog-id=85 op=UNLOAD Feb 12 20:38:35.325000 audit: BPF prog-id=84 op=UNLOAD Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { perfmon } for pid=1802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit[1802]: AVC avc: denied { bpf } for pid=1802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.325000 audit: BPF prog-id=86 op=LOAD Feb 12 20:38:35.325000 audit[1802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c3368 items=0 ppid=1670 pid=1802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433313564343161613030386235656330386435656235653562643561 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.332000 audit: BPF prog-id=87 op=LOAD Feb 12 20:38:35.334000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.334000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1694 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326131306136376663613834666231373236316565373233336165 Feb 12 20:38:35.334000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.334000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1694 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326131306136376663613834666231373236316565373233336165 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.335000 audit: BPF prog-id=88 op=LOAD Feb 12 20:38:35.335000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d9d8 a2=78 a3=c000025270 items=0 ppid=1694 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326131306136376663613834666231373236316565373233336165 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.336000 audit: BPF prog-id=89 op=LOAD Feb 12 20:38:35.336000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=19 a0=5 a1=c00014d770 a2=78 a3=c0000252b8 items=0 ppid=1694 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326131306136376663613834666231373236316565373233336165 Feb 12 20:38:35.337000 audit: BPF prog-id=89 op=UNLOAD Feb 12 20:38:35.337000 audit: BPF prog-id=88 op=UNLOAD Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:35.337000 audit: BPF prog-id=90 op=LOAD Feb 12 20:38:35.337000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014dc30 a2=78 a3=c0000256c8 items=0 ppid=1694 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:35.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664326131306136376663613834666231373236316565373233336165 Feb 12 20:38:35.341842 env[1059]: time="2024-02-12T20:38:35.341776987Z" level=info msg="StartContainer for \"e83631418eabf68b8676d9be8d99b87bdb1d7f3a381c90c1a48af26accfd4ada\" returns successfully" Feb 12 20:38:35.387187 env[1059]: time="2024-02-12T20:38:35.387056683Z" level=info msg="StartContainer for \"6d2a10a67fca84fb17261ee7233ae08d0a54a3c66fc067ffd38f211f1478d1d9\" returns successfully" Feb 12 20:38:35.404390 env[1059]: time="2024-02-12T20:38:35.404346472Z" level=info msg="StartContainer for \"d315d41aa008b5ec08d5eb5e5bd5a78a53cda43fbb7e9ecf68503cf1ae21ec9c\" returns successfully" Feb 12 20:38:35.786954 kubelet[1604]: E0212 20:38:35.786921 1604 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.200:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.200:6443: connect: connection refused Feb 12 20:38:36.225000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:36.225000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000189c20 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:36.225000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:36.225000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:36.225000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cc4040 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:36.225000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:36.800442 kubelet[1604]: I0212 20:38:36.800415 1604 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:38.161000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.164357 kernel: kauditd_printk_skb: 643 callbacks suppressed Feb 12 20:38:38.164511 kernel: audit: type=1400 audit(1707770318.161:658): avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.161000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00307e1c0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.174423 kernel: audit: type=1300 audit(1707770318.161:658): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c00307e1c0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.161000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.179680 kernel: audit: type=1327 audit(1707770318.161:658): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.180000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.186695 kernel: audit: type=1400 audit(1707770318.180:659): avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.180000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c00434adb0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.197866 kernel: audit: type=1300 audit(1707770318.180:659): arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c00434adb0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.197974 kernel: audit: type=1327 audit(1707770318.180:659): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.185000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.206270 kernel: audit: type=1400 audit(1707770318.185:660): avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.185000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00448c480 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.215275 kernel: audit: type=1300 audit(1707770318.185:660): arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00448c480 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.185000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.225274 kernel: audit: type=1327 audit(1707770318.185:660): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.205000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.230281 kernel: audit: type=1400 audit(1707770318.205:661): avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.205000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004728030 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.205000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.268000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.268000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c007a455e0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.268000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:38.268000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7f a1=c008c741b0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:38:38.268000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:38:38.360474 kubelet[1604]: E0212 20:38:38.360446 1604 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-2-6-02325721ca.novalocal\" not found" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:38.405049 kubelet[1604]: I0212 20:38:38.405000 1604 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:38.676204 kubelet[1604]: I0212 20:38:38.676118 1604 apiserver.go:52] "Watching apiserver" Feb 12 20:38:38.685128 kubelet[1604]: I0212 20:38:38.685075 1604 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:38:38.725764 kubelet[1604]: I0212 20:38:38.725657 1604 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:38:40.543000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524843 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 20:38:40.543000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00023f380 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:40.543000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:41.468541 systemd[1]: Reloading. Feb 12 20:38:41.610806 /usr/lib/systemd/system-generators/torcx-generator[1902]: time="2024-02-12T20:38:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:38:41.610838 /usr/lib/systemd/system-generators/torcx-generator[1902]: time="2024-02-12T20:38:41Z" level=info msg="torcx already run" Feb 12 20:38:41.691165 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:38:41.691187 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:38:41.714677 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit: BPF prog-id=91 op=LOAD Feb 12 20:38:41.808000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.809000 audit: BPF prog-id=92 op=LOAD Feb 12 20:38:41.809000 audit: BPF prog-id=87 op=UNLOAD Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit: BPF prog-id=93 op=LOAD Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit: BPF prog-id=94 op=LOAD Feb 12 20:38:41.811000 audit: BPF prog-id=52 op=UNLOAD Feb 12 20:38:41.811000 audit: BPF prog-id=53 op=UNLOAD Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.811000 audit: BPF prog-id=95 op=LOAD Feb 12 20:38:41.811000 audit: BPF prog-id=54 op=UNLOAD Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit: BPF prog-id=96 op=LOAD Feb 12 20:38:41.812000 audit: BPF prog-id=55 op=UNLOAD Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.812000 audit: BPF prog-id=97 op=LOAD Feb 12 20:38:41.812000 audit: BPF prog-id=56 op=UNLOAD Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit: BPF prog-id=98 op=LOAD Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit: BPF prog-id=99 op=LOAD Feb 12 20:38:41.813000 audit: BPF prog-id=57 op=UNLOAD Feb 12 20:38:41.813000 audit: BPF prog-id=58 op=UNLOAD Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.813000 audit: BPF prog-id=100 op=LOAD Feb 12 20:38:41.813000 audit: BPF prog-id=74 op=UNLOAD Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.814000 audit: BPF prog-id=101 op=LOAD Feb 12 20:38:41.814000 audit: BPF prog-id=83 op=UNLOAD Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.815000 audit: BPF prog-id=102 op=LOAD Feb 12 20:38:41.815000 audit: BPF prog-id=59 op=UNLOAD Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit: BPF prog-id=103 op=LOAD Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit: BPF prog-id=104 op=LOAD Feb 12 20:38:41.816000 audit: BPF prog-id=60 op=UNLOAD Feb 12 20:38:41.816000 audit: BPF prog-id=61 op=UNLOAD Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit: BPF prog-id=105 op=LOAD Feb 12 20:38:41.817000 audit: BPF prog-id=62 op=UNLOAD Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit: BPF prog-id=106 op=LOAD Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit: BPF prog-id=107 op=LOAD Feb 12 20:38:41.817000 audit: BPF prog-id=63 op=UNLOAD Feb 12 20:38:41.817000 audit: BPF prog-id=64 op=UNLOAD Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.817000 audit: BPF prog-id=108 op=LOAD Feb 12 20:38:41.817000 audit: BPF prog-id=67 op=UNLOAD Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.818000 audit: BPF prog-id=109 op=LOAD Feb 12 20:38:41.818000 audit: BPF prog-id=71 op=UNLOAD Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.821000 audit: BPF prog-id=110 op=LOAD Feb 12 20:38:41.821000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:41.822000 audit: BPF prog-id=111 op=LOAD Feb 12 20:38:41.822000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:38:41.836298 systemd[1]: Stopping kubelet.service... Feb 12 20:38:41.863855 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 20:38:41.864156 systemd[1]: Stopped kubelet.service. Feb 12 20:38:41.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:41.864280 systemd[1]: kubelet.service: Consumed 1.079s CPU time. Feb 12 20:38:41.868803 systemd[1]: Started kubelet.service. Feb 12 20:38:41.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:41.973784 kubelet[1941]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:38:41.973784 kubelet[1941]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 20:38:41.973784 kubelet[1941]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:38:41.974275 kubelet[1941]: I0212 20:38:41.973830 1941 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:38:41.987788 kubelet[1941]: I0212 20:38:41.987733 1941 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 20:38:41.987788 kubelet[1941]: I0212 20:38:41.987782 1941 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:38:41.988069 kubelet[1941]: I0212 20:38:41.988043 1941 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 20:38:41.990126 kubelet[1941]: I0212 20:38:41.990100 1941 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 20:38:41.991616 kubelet[1941]: I0212 20:38:41.991589 1941 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:38:41.995432 kubelet[1941]: I0212 20:38:41.995413 1941 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:38:41.995667 kubelet[1941]: I0212 20:38:41.995642 1941 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:38:41.995722 kubelet[1941]: I0212 20:38:41.995711 1941 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:38:41.995820 kubelet[1941]: I0212 20:38:41.995736 1941 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:38:41.995820 kubelet[1941]: I0212 20:38:41.995748 1941 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 20:38:41.995820 kubelet[1941]: I0212 20:38:41.995772 1941 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:38:41.999074 kubelet[1941]: I0212 20:38:41.999041 1941 kubelet.go:405] "Attempting to sync node with API server" Feb 12 20:38:41.999074 kubelet[1941]: I0212 20:38:41.999066 1941 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:38:41.999174 kubelet[1941]: I0212 20:38:41.999083 1941 kubelet.go:309] "Adding apiserver pod source" Feb 12 20:38:41.999174 kubelet[1941]: I0212 20:38:41.999098 1941 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:38:42.000670 kubelet[1941]: I0212 20:38:42.000642 1941 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:38:42.003402 kubelet[1941]: I0212 20:38:42.003382 1941 server.go:1168] "Started kubelet" Feb 12 20:38:42.008000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:42.008000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:38:42.008000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e78660 a1=c000e34948 a2=c000e78630 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:42.008000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:38:42.008000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:42.008000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:38:42.008000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e50520 a1=c000e34960 a2=c000e786f0 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:42.008000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:38:42.011713 kubelet[1941]: I0212 20:38:42.009505 1941 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:38:42.011713 kubelet[1941]: I0212 20:38:42.009547 1941 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:38:42.011713 kubelet[1941]: I0212 20:38:42.009571 1941 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:38:42.014598 kubelet[1941]: I0212 20:38:42.014577 1941 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:38:42.017361 kubelet[1941]: I0212 20:38:42.017334 1941 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 20:38:42.024250 kubelet[1941]: I0212 20:38:42.024200 1941 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 20:38:42.027256 kubelet[1941]: I0212 20:38:42.025021 1941 server.go:461] "Adding debug handlers to kubelet server" Feb 12 20:38:42.027256 kubelet[1941]: I0212 20:38:42.026102 1941 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 20:38:42.033948 kubelet[1941]: E0212 20:38:42.031825 1941 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:38:42.033948 kubelet[1941]: E0212 20:38:42.031852 1941 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:38:42.035213 kubelet[1941]: I0212 20:38:42.034581 1941 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:38:42.035436 kubelet[1941]: I0212 20:38:42.035416 1941 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:38:42.035436 kubelet[1941]: I0212 20:38:42.035436 1941 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 20:38:42.035501 kubelet[1941]: I0212 20:38:42.035452 1941 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 20:38:42.035501 kubelet[1941]: E0212 20:38:42.035499 1941 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 20:38:42.143315 kubelet[1941]: E0212 20:38:42.136131 1941 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 20:38:42.143459 kubelet[1941]: I0212 20:38:42.139621 1941 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.144288 kubelet[1941]: I0212 20:38:42.140311 1941 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:38:42.144288 kubelet[1941]: I0212 20:38:42.143749 1941 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:38:42.144288 kubelet[1941]: I0212 20:38:42.143772 1941 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:38:42.144288 kubelet[1941]: I0212 20:38:42.143940 1941 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 20:38:42.144288 kubelet[1941]: I0212 20:38:42.143954 1941 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 20:38:42.144288 kubelet[1941]: I0212 20:38:42.143961 1941 policy_none.go:49] "None policy: Start" Feb 12 20:38:42.152689 kubelet[1941]: I0212 20:38:42.152650 1941 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:38:42.152689 kubelet[1941]: I0212 20:38:42.152688 1941 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:38:42.152940 kubelet[1941]: I0212 20:38:42.152917 1941 state_mem.go:75] "Updated machine memory state" Feb 12 20:38:42.158414 kubelet[1941]: I0212 20:38:42.158369 1941 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.158573 kubelet[1941]: I0212 20:38:42.158458 1941 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.164259 kubelet[1941]: I0212 20:38:42.164207 1941 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:38:42.164391 kubelet[1941]: I0212 20:38:42.164300 1941 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:38:42.163000 audit[1941]: AVC avc: denied { mac_admin } for pid=1941 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:42.163000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:38:42.163000 audit[1941]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e78e40 a1=c00005c810 a2=c000e78e10 a3=25 items=0 ppid=1 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:42.163000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:38:42.164666 kubelet[1941]: I0212 20:38:42.164517 1941 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:38:42.344430 kubelet[1941]: I0212 20:38:42.344356 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:42.344577 kubelet[1941]: I0212 20:38:42.344533 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:42.344633 kubelet[1941]: I0212 20:38:42.344606 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:42.388089 kubelet[1941]: W0212 20:38:42.388032 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 20:38:42.388569 kubelet[1941]: W0212 20:38:42.388526 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 20:38:42.396290 kubelet[1941]: W0212 20:38:42.396187 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 20:38:42.429264 kubelet[1941]: I0212 20:38:42.429174 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/926e3e41f8e4557e8bf7a280e131e1c1-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"926e3e41f8e4557e8bf7a280e131e1c1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429264 kubelet[1941]: I0212 20:38:42.429235 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429264 kubelet[1941]: I0212 20:38:42.429270 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429494 kubelet[1941]: I0212 20:38:42.429295 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/59c941429f70187406dbe6dd8213d87e-kubeconfig\") pod \"kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"59c941429f70187406dbe6dd8213d87e\") " pod="kube-system/kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429494 kubelet[1941]: I0212 20:38:42.429324 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/926e3e41f8e4557e8bf7a280e131e1c1-ca-certs\") pod \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"926e3e41f8e4557e8bf7a280e131e1c1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429494 kubelet[1941]: I0212 20:38:42.429348 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/926e3e41f8e4557e8bf7a280e131e1c1-k8s-certs\") pod \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"926e3e41f8e4557e8bf7a280e131e1c1\") " pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429494 kubelet[1941]: I0212 20:38:42.429372 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-ca-certs\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429494 kubelet[1941]: I0212 20:38:42.429396 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:42.429653 kubelet[1941]: I0212 20:38:42.429421 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/67d05bbb47d4ca3ac0af06e4d6785cd7-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal\" (UID: \"67d05bbb47d4ca3ac0af06e4d6785cd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:43.005425 kubelet[1941]: I0212 20:38:43.005384 1941 apiserver.go:52] "Watching apiserver" Feb 12 20:38:43.025154 kubelet[1941]: I0212 20:38:43.025117 1941 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 20:38:43.033198 kubelet[1941]: I0212 20:38:43.033157 1941 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:38:43.105037 kubelet[1941]: W0212 20:38:43.104968 1941 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 20:38:43.105844 kubelet[1941]: E0212 20:38:43.105791 1941 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:38:43.129910 kubelet[1941]: I0212 20:38:43.129866 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-2-6-02325721ca.novalocal" podStartSLOduration=1.12854511 podCreationTimestamp="2024-02-12 20:38:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:38:43.126571573 +0000 UTC m=+1.240622791" watchObservedRunningTime="2024-02-12 20:38:43.12854511 +0000 UTC m=+1.242596309" Feb 12 20:38:43.130665 kubelet[1941]: I0212 20:38:43.130636 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-2-6-02325721ca.novalocal" podStartSLOduration=1.130545327 podCreationTimestamp="2024-02-12 20:38:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:38:43.108298553 +0000 UTC m=+1.222349771" watchObservedRunningTime="2024-02-12 20:38:43.130545327 +0000 UTC m=+1.244596535" Feb 12 20:38:43.187620 kubelet[1941]: I0212 20:38:43.187579 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-2-6-02325721ca.novalocal" podStartSLOduration=1.187538708 podCreationTimestamp="2024-02-12 20:38:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:38:43.154209709 +0000 UTC m=+1.268260927" watchObservedRunningTime="2024-02-12 20:38:43.187538708 +0000 UTC m=+1.301589876" Feb 12 20:38:46.658850 sudo[1196]: pam_unix(sudo:session): session closed for user root Feb 12 20:38:46.657000 audit[1196]: USER_END pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:46.661534 kernel: kauditd_printk_skb: 269 callbacks suppressed Feb 12 20:38:46.661605 kernel: audit: type=1106 audit(1707770326.657:914): pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:46.661000 audit[1196]: CRED_DISP pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:46.681268 kernel: audit: type=1104 audit(1707770326.661:915): pid=1196 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:38:46.845389 sshd[1192]: pam_unix(sshd:session): session closed for user core Feb 12 20:38:46.846000 audit[1192]: USER_END pid=1192 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:46.851021 systemd[1]: sshd@6-172.24.4.200:22-172.24.4.1:59478.service: Deactivated successfully. Feb 12 20:38:46.852544 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:38:46.852859 systemd[1]: session-7.scope: Consumed 7.131s CPU time. Feb 12 20:38:46.846000 audit[1192]: CRED_DISP pid=1192 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:46.871374 kernel: audit: type=1106 audit(1707770326.846:916): pid=1192 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:46.871503 kernel: audit: type=1104 audit(1707770326.846:917): pid=1192 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:38:46.871519 systemd-logind[1049]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:38:46.882142 kernel: audit: type=1131 audit(1707770326.846:918): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.200:22-172.24.4.1:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:46.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.200:22-172.24.4.1:59478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:38:46.883760 systemd-logind[1049]: Removed session 7. Feb 12 20:38:51.259000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:51.272448 kernel: audit: type=1400 audit(1707770331.259:919): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:51.259000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea4b00 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:51.259000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:51.298646 kernel: audit: type=1300 audit(1707770331.259:919): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea4b00 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:51.298819 kernel: audit: type=1327 audit(1707770331.259:919): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:51.266000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:51.311292 kernel: audit: type=1400 audit(1707770331.266:920): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:51.311467 kernel: audit: type=1300 audit(1707770331.266:920): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea4de0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:51.266000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea4de0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:51.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:51.271000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:51.271000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000ea4f20 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:51.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:51.271000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:38:51.271000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ea5060 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:38:51.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:38:53.717727 kubelet[1941]: I0212 20:38:53.717683 1941 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 20:38:53.718883 env[1059]: time="2024-02-12T20:38:53.718800867Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:38:53.719793 kubelet[1941]: I0212 20:38:53.719763 1941 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 20:38:54.241319 kubelet[1941]: I0212 20:38:54.241217 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:54.254365 systemd[1]: Created slice kubepods-besteffort-pod0b5d5898_273f_4e84_bc4f_14a0245f1f64.slice. Feb 12 20:38:54.324657 kubelet[1941]: I0212 20:38:54.324629 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0b5d5898-273f-4e84-bc4f-14a0245f1f64-kube-proxy\") pod \"kube-proxy-xx9x8\" (UID: \"0b5d5898-273f-4e84-bc4f-14a0245f1f64\") " pod="kube-system/kube-proxy-xx9x8" Feb 12 20:38:54.324847 kubelet[1941]: I0212 20:38:54.324835 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0b5d5898-273f-4e84-bc4f-14a0245f1f64-xtables-lock\") pod \"kube-proxy-xx9x8\" (UID: \"0b5d5898-273f-4e84-bc4f-14a0245f1f64\") " pod="kube-system/kube-proxy-xx9x8" Feb 12 20:38:54.324959 kubelet[1941]: I0212 20:38:54.324947 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0b5d5898-273f-4e84-bc4f-14a0245f1f64-lib-modules\") pod \"kube-proxy-xx9x8\" (UID: \"0b5d5898-273f-4e84-bc4f-14a0245f1f64\") " pod="kube-system/kube-proxy-xx9x8" Feb 12 20:38:54.425777 kubelet[1941]: I0212 20:38:54.425712 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-trzt7\" (UniqueName: \"kubernetes.io/projected/0b5d5898-273f-4e84-bc4f-14a0245f1f64-kube-api-access-trzt7\") pod \"kube-proxy-xx9x8\" (UID: \"0b5d5898-273f-4e84-bc4f-14a0245f1f64\") " pod="kube-system/kube-proxy-xx9x8" Feb 12 20:38:54.567920 env[1059]: time="2024-02-12T20:38:54.567422188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xx9x8,Uid:0b5d5898-273f-4e84-bc4f-14a0245f1f64,Namespace:kube-system,Attempt:0,}" Feb 12 20:38:54.601097 env[1059]: time="2024-02-12T20:38:54.601029791Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:38:54.601366 env[1059]: time="2024-02-12T20:38:54.601313832Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:38:54.601549 env[1059]: time="2024-02-12T20:38:54.601523124Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:38:54.601805 env[1059]: time="2024-02-12T20:38:54.601775517Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9aacf6ca2793d4f1da991074c251ce940514d52e607c4abc18380b88469d769 pid=2023 runtime=io.containerd.runc.v2 Feb 12 20:38:54.644532 systemd[1]: run-containerd-runc-k8s.io-f9aacf6ca2793d4f1da991074c251ce940514d52e607c4abc18380b88469d769-runc.VXAf8y.mount: Deactivated successfully. Feb 12 20:38:54.654047 systemd[1]: Started cri-containerd-f9aacf6ca2793d4f1da991074c251ce940514d52e607c4abc18380b88469d769.scope. Feb 12 20:38:54.682988 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 20:38:54.683106 kernel: audit: type=1400 audit(1707770334.676:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.689442 kernel: audit: type=1400 audit(1707770334.676:924): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.697337 kernel: audit: type=1400 audit(1707770334.676:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.711952 kernel: audit: type=1400 audit(1707770334.676:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.712082 kernel: audit: type=1400 audit(1707770334.676:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.722074 kernel: audit: type=1400 audit(1707770334.676:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.722178 kernel: audit: type=1400 audit(1707770334.676:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.730089 kernel: audit: type=1400 audit(1707770334.676:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.730163 kernel: audit: type=1400 audit(1707770334.676:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.682000 audit: BPF prog-id=112 op=LOAD Feb 12 20:38:54.736308 kernel: audit: type=1400 audit(1707770334.682:932): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2023 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616163663663613237393364346631646139393130373463323531 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2023 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616163663663613237393364346631646139393130373463323531 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit: BPF prog-id=113 op=LOAD Feb 12 20:38:54.683000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002807e0 items=0 ppid=2023 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616163663663613237393364346631646139393130373463323531 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit: BPF prog-id=114 op=LOAD Feb 12 20:38:54.683000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000280828 items=0 ppid=2023 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616163663663613237393364346631646139393130373463323531 Feb 12 20:38:54.683000 audit: BPF prog-id=114 op=UNLOAD Feb 12 20:38:54.683000 audit: BPF prog-id=113 op=UNLOAD Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.683000 audit: BPF prog-id=115 op=LOAD Feb 12 20:38:54.683000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000280c38 items=0 ppid=2023 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639616163663663613237393364346631646139393130373463323531 Feb 12 20:38:54.740214 env[1059]: time="2024-02-12T20:38:54.740154677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xx9x8,Uid:0b5d5898-273f-4e84-bc4f-14a0245f1f64,Namespace:kube-system,Attempt:0,} returns sandbox id \"f9aacf6ca2793d4f1da991074c251ce940514d52e607c4abc18380b88469d769\"" Feb 12 20:38:54.751260 env[1059]: time="2024-02-12T20:38:54.747974245Z" level=info msg="CreateContainer within sandbox \"f9aacf6ca2793d4f1da991074c251ce940514d52e607c4abc18380b88469d769\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:38:54.787186 env[1059]: time="2024-02-12T20:38:54.787127509Z" level=info msg="CreateContainer within sandbox \"f9aacf6ca2793d4f1da991074c251ce940514d52e607c4abc18380b88469d769\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7f2151de54e506cd1d6ca893b81b1fb1a09fe2dfeb2b16ff63bb5613fc2312ae\"" Feb 12 20:38:54.788304 env[1059]: time="2024-02-12T20:38:54.788261632Z" level=info msg="StartContainer for \"7f2151de54e506cd1d6ca893b81b1fb1a09fe2dfeb2b16ff63bb5613fc2312ae\"" Feb 12 20:38:54.812667 systemd[1]: Started cri-containerd-7f2151de54e506cd1d6ca893b81b1fb1a09fe2dfeb2b16ff63bb5613fc2312ae.scope. Feb 12 20:38:54.824765 kubelet[1941]: I0212 20:38:54.824641 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:38:54.832614 systemd[1]: Created slice kubepods-besteffort-poded8c3227_203a_4985_a110_3a6ed36d3e29.slice. Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7efec23ef618 items=0 ppid=2023 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766323135316465353465353036636431643663613839336238316231 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.867000 audit: BPF prog-id=116 op=LOAD Feb 12 20:38:54.867000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038cf38 items=0 ppid=2023 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766323135316465353465353036636431643663613839336238316231 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit: BPF prog-id=117 op=LOAD Feb 12 20:38:54.869000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038cf88 items=0 ppid=2023 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766323135316465353465353036636431643663613839336238316231 Feb 12 20:38:54.869000 audit: BPF prog-id=117 op=UNLOAD Feb 12 20:38:54.869000 audit: BPF prog-id=116 op=UNLOAD Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { perfmon } for pid=2064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit[2064]: AVC avc: denied { bpf } for pid=2064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:54.869000 audit: BPF prog-id=118 op=LOAD Feb 12 20:38:54.869000 audit[2064]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038d018 items=0 ppid=2023 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:54.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766323135316465353465353036636431643663613839336238316231 Feb 12 20:38:54.901194 env[1059]: time="2024-02-12T20:38:54.901139225Z" level=info msg="StartContainer for \"7f2151de54e506cd1d6ca893b81b1fb1a09fe2dfeb2b16ff63bb5613fc2312ae\" returns successfully" Feb 12 20:38:54.932732 kubelet[1941]: I0212 20:38:54.932624 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ed8c3227-203a-4985-a110-3a6ed36d3e29-var-lib-calico\") pod \"tigera-operator-7ff8dc855-p94qb\" (UID: \"ed8c3227-203a-4985-a110-3a6ed36d3e29\") " pod="tigera-operator/tigera-operator-7ff8dc855-p94qb" Feb 12 20:38:54.932732 kubelet[1941]: I0212 20:38:54.932671 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-72qxg\" (UniqueName: \"kubernetes.io/projected/ed8c3227-203a-4985-a110-3a6ed36d3e29-kube-api-access-72qxg\") pod \"tigera-operator-7ff8dc855-p94qb\" (UID: \"ed8c3227-203a-4985-a110-3a6ed36d3e29\") " pod="tigera-operator/tigera-operator-7ff8dc855-p94qb" Feb 12 20:38:55.136930 env[1059]: time="2024-02-12T20:38:55.136786317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-p94qb,Uid:ed8c3227-203a-4985-a110-3a6ed36d3e29,Namespace:tigera-operator,Attempt:0,}" Feb 12 20:38:55.200189 env[1059]: time="2024-02-12T20:38:55.200018870Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:38:55.200189 env[1059]: time="2024-02-12T20:38:55.200109911Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:38:55.200637 env[1059]: time="2024-02-12T20:38:55.200143614Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:38:55.201114 env[1059]: time="2024-02-12T20:38:55.201013132Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2257edfed64f043fc83128cd2e7773be4de5035bb12d7b43b5b7030f28391f60 pid=2102 runtime=io.containerd.runc.v2 Feb 12 20:38:55.232345 systemd[1]: Started cri-containerd-2257edfed64f043fc83128cd2e7773be4de5035bb12d7b43b5b7030f28391f60.scope. Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit: BPF prog-id=119 op=LOAD Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2102 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353765646665643634663034336663383331323863643265373737 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2102 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353765646665643634663034336663383331323863643265373737 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.268000 audit: BPF prog-id=120 op=LOAD Feb 12 20:38:55.268000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00009e370 items=0 ppid=2102 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353765646665643634663034336663383331323863643265373737 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.269000 audit: BPF prog-id=121 op=LOAD Feb 12 20:38:55.269000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00009e3b8 items=0 ppid=2102 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353765646665643634663034336663383331323863643265373737 Feb 12 20:38:55.270000 audit: BPF prog-id=121 op=UNLOAD Feb 12 20:38:55.270000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { perfmon } for pid=2112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit[2112]: AVC avc: denied { bpf } for pid=2112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:55.270000 audit: BPF prog-id=122 op=LOAD Feb 12 20:38:55.270000 audit[2112]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00009e7c8 items=0 ppid=2102 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232353765646665643634663034336663383331323863643265373737 Feb 12 20:38:55.305761 env[1059]: time="2024-02-12T20:38:55.305696078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-p94qb,Uid:ed8c3227-203a-4985-a110-3a6ed36d3e29,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"2257edfed64f043fc83128cd2e7773be4de5035bb12d7b43b5b7030f28391f60\"" Feb 12 20:38:55.312165 env[1059]: time="2024-02-12T20:38:55.311665123Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 20:38:55.533000 audit[2157]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.533000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe4809ed70 a2=0 a3=7ffe4809ed5c items=0 ppid=2077 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:38:55.534000 audit[2158]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.534000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc37e54460 a2=0 a3=7ffc37e5444c items=0 ppid=2077 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:38:55.535000 audit[2159]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.535000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd1da7a70 a2=0 a3=7ffcd1da7a5c items=0 ppid=2077 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:38:55.545000 audit[2160]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.545000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe855a1a60 a2=0 a3=7ffe855a1a4c items=0 ppid=2077 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:38:55.549000 audit[2161]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.549000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdab1e8a60 a2=0 a3=7ffdab1e8a4c items=0 ppid=2077 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:38:55.552000 audit[2162]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.552000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca20455b0 a2=0 a3=7ffca204559c items=0 ppid=2077 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:38:55.656000 audit[2163]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.656000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce70d1260 a2=0 a3=7ffce70d124c items=0 ppid=2077 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:38:55.664000 audit[2165]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.664000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc368ac9c0 a2=0 a3=7ffc368ac9ac items=0 ppid=2077 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.664000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:38:55.674000 audit[2168]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.674000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8448f080 a2=0 a3=7ffc8448f06c items=0 ppid=2077 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:38:55.676000 audit[2169]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.676000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1b935c30 a2=0 a3=7ffd1b935c1c items=0 ppid=2077 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.676000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:38:55.684000 audit[2171]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.684000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea981d4f0 a2=0 a3=7ffea981d4dc items=0 ppid=2077 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:38:55.687000 audit[2172]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.687000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2a6ee6d0 a2=0 a3=7ffe2a6ee6bc items=0 ppid=2077 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:38:55.697000 audit[2174]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.697000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcb83400d0 a2=0 a3=7ffcb83400bc items=0 ppid=2077 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:38:55.709000 audit[2177]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.709000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda3a5b900 a2=0 a3=7ffda3a5b8ec items=0 ppid=2077 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.709000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:38:55.712000 audit[2178]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.712000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc6243e20 a2=0 a3=7fffc6243e0c items=0 ppid=2077 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.712000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:38:55.719000 audit[2180]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.719000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffd32a140 a2=0 a3=7ffffd32a12c items=0 ppid=2077 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.719000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:38:55.722000 audit[2181]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.722000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefe2bd7c0 a2=0 a3=7ffefe2bd7ac items=0 ppid=2077 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:38:55.729000 audit[2183]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.729000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc326b95f0 a2=0 a3=7ffc326b95dc items=0 ppid=2077 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:38:55.737000 audit[2186]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.737000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc38b56360 a2=0 a3=7ffc38b5634c items=0 ppid=2077 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:38:55.750000 audit[2190]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.750000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcafb9fe70 a2=0 a3=7ffcafb9fe5c items=0 ppid=2077 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:38:55.753000 audit[2191]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.753000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf6140640 a2=0 a3=7ffdf614062c items=0 ppid=2077 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:38:55.762000 audit[2193]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.762000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff70dca4b0 a2=0 a3=7fff70dca49c items=0 ppid=2077 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:38:55.770000 audit[2196]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.770000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4fb112b0 a2=0 a3=7ffe4fb1129c items=0 ppid=2077 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:38:55.785000 audit[2201]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.785000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd4e01650 a2=0 a3=7ffdd4e0163c items=0 ppid=2077 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:38:55.789000 audit[2203]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:38:55.789000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd55adab50 a2=0 a3=7ffd55adab3c items=0 ppid=2077 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:38:55.822000 audit[2205]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:38:55.822000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffebe604b00 a2=0 a3=7ffebe604aec items=0 ppid=2077 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:38:55.838000 audit[2205]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:38:55.838000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffebe604b00 a2=0 a3=7ffebe604aec items=0 ppid=2077 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:38:55.840000 audit[2212]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.840000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0c795e00 a2=0 a3=7fff0c795dec items=0 ppid=2077 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:38:55.846000 audit[2214]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.846000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffde7cc5660 a2=0 a3=7ffde7cc564c items=0 ppid=2077 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:38:55.850000 audit[2217]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.850000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc3d43bef0 a2=0 a3=7ffc3d43bedc items=0 ppid=2077 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:38:55.851000 audit[2218]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.851000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8a3449c0 a2=0 a3=7ffe8a3449ac items=0 ppid=2077 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.851000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:38:55.854000 audit[2220]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.854000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce25ae1f0 a2=0 a3=7ffce25ae1dc items=0 ppid=2077 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.854000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:38:55.855000 audit[2221]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.855000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda5028c90 a2=0 a3=7ffda5028c7c items=0 ppid=2077 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:38:55.858000 audit[2223]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.858000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc15ee9430 a2=0 a3=7ffc15ee941c items=0 ppid=2077 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:38:55.862000 audit[2226]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.862000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdef581f60 a2=0 a3=7ffdef581f4c items=0 ppid=2077 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.862000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:38:55.863000 audit[2227]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.863000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd0d494080 a2=0 a3=7ffd0d49406c items=0 ppid=2077 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.863000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:38:55.866000 audit[2229]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.866000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4bb16550 a2=0 a3=7ffd4bb1653c items=0 ppid=2077 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.866000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:38:55.867000 audit[2230]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.867000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6580e800 a2=0 a3=7ffe6580e7ec items=0 ppid=2077 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.867000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:38:55.869000 audit[2232]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.869000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea4e667d0 a2=0 a3=7ffea4e667bc items=0 ppid=2077 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:38:55.874000 audit[2235]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.874000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff44d7efa0 a2=0 a3=7fff44d7ef8c items=0 ppid=2077 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.874000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:38:55.889000 audit[2238]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.889000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff85cd2950 a2=0 a3=7fff85cd293c items=0 ppid=2077 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.889000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:38:55.891000 audit[2239]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.891000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff663becb0 a2=0 a3=7fff663bec9c items=0 ppid=2077 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:38:55.893000 audit[2241]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.893000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc58b22600 a2=0 a3=7ffc58b225ec items=0 ppid=2077 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.893000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:38:55.897000 audit[2244]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.897000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcca7686f0 a2=0 a3=7ffcca7686dc items=0 ppid=2077 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.897000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:38:55.899000 audit[2245]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.899000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe372c6710 a2=0 a3=7ffe372c66fc items=0 ppid=2077 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:38:55.904000 audit[2247]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.904000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff939ba340 a2=0 a3=7fff939ba32c items=0 ppid=2077 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:38:55.908000 audit[2250]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.908000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe4552c930 a2=0 a3=7ffe4552c91c items=0 ppid=2077 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:38:55.909000 audit[2251]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.909000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff191e1740 a2=0 a3=7fff191e172c items=0 ppid=2077 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:38:55.912000 audit[2253]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:38:55.912000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffeaf7a3b20 a2=0 a3=7ffeaf7a3b0c items=0 ppid=2077 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:38:55.915000 audit[2255]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:38:55.915000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffce9248510 a2=0 a3=7ffce92484fc items=0 ppid=2077 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.915000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:38:55.916000 audit[2255]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:38:55.916000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffce9248510 a2=0 a3=7ffce92484fc items=0 ppid=2077 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:55.916000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:38:56.697521 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3727325691.mount: Deactivated successfully. Feb 12 20:38:58.484510 env[1059]: time="2024-02-12T20:38:58.484390141Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:58.494075 env[1059]: time="2024-02-12T20:38:58.494002472Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:58.499384 env[1059]: time="2024-02-12T20:38:58.499335750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:58.504764 env[1059]: time="2024-02-12T20:38:58.504704144Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:38:58.509427 env[1059]: time="2024-02-12T20:38:58.508747406Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 20:38:58.520468 env[1059]: time="2024-02-12T20:38:58.520373729Z" level=info msg="CreateContainer within sandbox \"2257edfed64f043fc83128cd2e7773be4de5035bb12d7b43b5b7030f28391f60\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 20:38:58.550589 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2928757389.mount: Deactivated successfully. Feb 12 20:38:58.565316 env[1059]: time="2024-02-12T20:38:58.565185300Z" level=info msg="CreateContainer within sandbox \"2257edfed64f043fc83128cd2e7773be4de5035bb12d7b43b5b7030f28391f60\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b6311b485b34776af6ddeac35e3b25fb58aba53754ab7d868c3a6a7724a97aaf\"" Feb 12 20:38:58.569542 env[1059]: time="2024-02-12T20:38:58.567193341Z" level=info msg="StartContainer for \"b6311b485b34776af6ddeac35e3b25fb58aba53754ab7d868c3a6a7724a97aaf\"" Feb 12 20:38:58.621289 systemd[1]: Started cri-containerd-b6311b485b34776af6ddeac35e3b25fb58aba53754ab7d868c3a6a7724a97aaf.scope. Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit: BPF prog-id=123 op=LOAD Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333131623438356233343737366166366464656163333565336232 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333131623438356233343737366166366464656163333565336232 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.633000 audit: BPF prog-id=124 op=LOAD Feb 12 20:38:58.633000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6c90 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:58.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333131623438356233343737366166366464656163333565336232 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit: BPF prog-id=125 op=LOAD Feb 12 20:38:58.634000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6cd8 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333131623438356233343737366166366464656163333565336232 Feb 12 20:38:58.634000 audit: BPF prog-id=125 op=UNLOAD Feb 12 20:38:58.634000 audit: BPF prog-id=124 op=UNLOAD Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { perfmon } for pid=2262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit[2262]: AVC avc: denied { bpf } for pid=2262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:38:58.634000 audit: BPF prog-id=126 op=LOAD Feb 12 20:38:58.634000 audit[2262]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c70e8 items=0 ppid=2102 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:38:58.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236333131623438356233343737366166366464656163333565336232 Feb 12 20:38:58.655153 env[1059]: time="2024-02-12T20:38:58.655113305Z" level=info msg="StartContainer for \"b6311b485b34776af6ddeac35e3b25fb58aba53754ab7d868c3a6a7724a97aaf\" returns successfully" Feb 12 20:38:59.156250 kubelet[1941]: I0212 20:38:59.156143 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-xx9x8" podStartSLOduration=5.156063195 podCreationTimestamp="2024-02-12 20:38:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:38:55.143973202 +0000 UTC m=+13.258024411" watchObservedRunningTime="2024-02-12 20:38:59.156063195 +0000 UTC m=+17.270114403" Feb 12 20:39:00.637000 audit[2294]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.638925 kernel: kauditd_printk_skb: 357 callbacks suppressed Feb 12 20:39:00.638998 kernel: audit: type=1325 audit(1707770340.637:1034): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.637000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffec7ac9fc0 a2=0 a3=7ffec7ac9fac items=0 ppid=2077 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.647257 kernel: audit: type=1300 audit(1707770340.637:1034): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffec7ac9fc0 a2=0 a3=7ffec7ac9fac items=0 ppid=2077 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.647338 kernel: audit: type=1327 audit(1707770340.637:1034): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.637000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.650000 audit[2294]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.650000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffec7ac9fc0 a2=0 a3=0 items=0 ppid=2077 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.659443 kernel: audit: type=1325 audit(1707770340.650:1035): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.659503 kernel: audit: type=1300 audit(1707770340.650:1035): arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffec7ac9fc0 a2=0 a3=0 items=0 ppid=2077 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.662601 kernel: audit: type=1327 audit(1707770340.650:1035): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.663000 audit[2296]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.663000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcca1d0cf0 a2=0 a3=7ffcca1d0cdc items=0 ppid=2077 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.672563 kernel: audit: type=1325 audit(1707770340.663:1036): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.672621 kernel: audit: type=1300 audit(1707770340.663:1036): arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffcca1d0cf0 a2=0 a3=7ffcca1d0cdc items=0 ppid=2077 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.675561 kernel: audit: type=1327 audit(1707770340.663:1036): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.664000 audit[2296]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.678720 kernel: audit: type=1325 audit(1707770340.664:1037): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:00.664000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffcca1d0cf0 a2=0 a3=0 items=0 ppid=2077 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:00.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:00.802775 kubelet[1941]: I0212 20:39:00.802712 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-p94qb" podStartSLOduration=3.600009489 podCreationTimestamp="2024-02-12 20:38:54 +0000 UTC" firstStartedPulling="2024-02-12 20:38:55.307840793 +0000 UTC m=+13.421891951" lastFinishedPulling="2024-02-12 20:38:58.510407745 +0000 UTC m=+16.624458953" observedRunningTime="2024-02-12 20:38:59.157684702 +0000 UTC m=+17.271735920" watchObservedRunningTime="2024-02-12 20:39:00.802576491 +0000 UTC m=+18.916627699" Feb 12 20:39:00.804103 kubelet[1941]: I0212 20:39:00.804051 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:39:00.813357 systemd[1]: Created slice kubepods-besteffort-pod6675b7fd_9ca8_493a_ba15_d3d2f3e1915e.slice. Feb 12 20:39:00.881988 kubelet[1941]: I0212 20:39:00.881966 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tskqq\" (UniqueName: \"kubernetes.io/projected/6675b7fd-9ca8-493a-ba15-d3d2f3e1915e-kube-api-access-tskqq\") pod \"calico-typha-5589dfb5b8-wb6sd\" (UID: \"6675b7fd-9ca8-493a-ba15-d3d2f3e1915e\") " pod="calico-system/calico-typha-5589dfb5b8-wb6sd" Feb 12 20:39:00.882198 kubelet[1941]: I0212 20:39:00.882186 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6675b7fd-9ca8-493a-ba15-d3d2f3e1915e-tigera-ca-bundle\") pod \"calico-typha-5589dfb5b8-wb6sd\" (UID: \"6675b7fd-9ca8-493a-ba15-d3d2f3e1915e\") " pod="calico-system/calico-typha-5589dfb5b8-wb6sd" Feb 12 20:39:00.882364 kubelet[1941]: I0212 20:39:00.882352 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6675b7fd-9ca8-493a-ba15-d3d2f3e1915e-typha-certs\") pod \"calico-typha-5589dfb5b8-wb6sd\" (UID: \"6675b7fd-9ca8-493a-ba15-d3d2f3e1915e\") " pod="calico-system/calico-typha-5589dfb5b8-wb6sd" Feb 12 20:39:00.909487 kubelet[1941]: I0212 20:39:00.909365 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:39:00.915344 systemd[1]: Created slice kubepods-besteffort-pod89133db5_9819_4cc4_ab76_3dbeff7e1d91.slice. Feb 12 20:39:00.982922 kubelet[1941]: I0212 20:39:00.982854 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/89133db5-9819-4cc4-ab76-3dbeff7e1d91-tigera-ca-bundle\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983072 kubelet[1941]: I0212 20:39:00.982963 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tc6x5\" (UniqueName: \"kubernetes.io/projected/89133db5-9819-4cc4-ab76-3dbeff7e1d91-kube-api-access-tc6x5\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983072 kubelet[1941]: I0212 20:39:00.983014 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-var-run-calico\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983132 kubelet[1941]: I0212 20:39:00.983082 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-var-lib-calico\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983163 kubelet[1941]: I0212 20:39:00.983154 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-xtables-lock\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983242 kubelet[1941]: I0212 20:39:00.983201 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-lib-modules\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983322 kubelet[1941]: I0212 20:39:00.983300 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-flexvol-driver-host\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983383 kubelet[1941]: I0212 20:39:00.983364 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/89133db5-9819-4cc4-ab76-3dbeff7e1d91-node-certs\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983431 kubelet[1941]: I0212 20:39:00.983414 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-cni-bin-dir\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983542 kubelet[1941]: I0212 20:39:00.983523 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-cni-log-dir\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983655 kubelet[1941]: I0212 20:39:00.983643 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-policysync\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:00.983745 kubelet[1941]: I0212 20:39:00.983735 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/89133db5-9819-4cc4-ab76-3dbeff7e1d91-cni-net-dir\") pod \"calico-node-xwbbk\" (UID: \"89133db5-9819-4cc4-ab76-3dbeff7e1d91\") " pod="calico-system/calico-node-xwbbk" Feb 12 20:39:01.031182 kubelet[1941]: I0212 20:39:01.031153 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:39:01.031650 kubelet[1941]: E0212 20:39:01.031632 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:01.085040 kubelet[1941]: I0212 20:39:01.085012 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fn9jk\" (UniqueName: \"kubernetes.io/projected/2ac59062-8b16-48ca-8928-9777b4540cb6-kube-api-access-fn9jk\") pod \"csi-node-driver-sbdjq\" (UID: \"2ac59062-8b16-48ca-8928-9777b4540cb6\") " pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:01.085307 kubelet[1941]: I0212 20:39:01.085287 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/2ac59062-8b16-48ca-8928-9777b4540cb6-varrun\") pod \"csi-node-driver-sbdjq\" (UID: \"2ac59062-8b16-48ca-8928-9777b4540cb6\") " pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:01.085479 kubelet[1941]: I0212 20:39:01.085467 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/2ac59062-8b16-48ca-8928-9777b4540cb6-registration-dir\") pod \"csi-node-driver-sbdjq\" (UID: \"2ac59062-8b16-48ca-8928-9777b4540cb6\") " pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:01.085639 kubelet[1941]: I0212 20:39:01.085627 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/2ac59062-8b16-48ca-8928-9777b4540cb6-kubelet-dir\") pod \"csi-node-driver-sbdjq\" (UID: \"2ac59062-8b16-48ca-8928-9777b4540cb6\") " pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:01.085753 kubelet[1941]: I0212 20:39:01.085733 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/2ac59062-8b16-48ca-8928-9777b4540cb6-socket-dir\") pod \"csi-node-driver-sbdjq\" (UID: \"2ac59062-8b16-48ca-8928-9777b4540cb6\") " pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:01.088605 kubelet[1941]: E0212 20:39:01.088574 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.088605 kubelet[1941]: W0212 20:39:01.088599 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.088781 kubelet[1941]: E0212 20:39:01.088633 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.094644 kubelet[1941]: E0212 20:39:01.094619 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.094644 kubelet[1941]: W0212 20:39:01.094640 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.094800 kubelet[1941]: E0212 20:39:01.094667 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.094831 kubelet[1941]: E0212 20:39:01.094815 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.094831 kubelet[1941]: W0212 20:39:01.094824 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.094894 kubelet[1941]: E0212 20:39:01.094836 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.097704 kubelet[1941]: E0212 20:39:01.097681 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.097704 kubelet[1941]: W0212 20:39:01.097697 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.097837 kubelet[1941]: E0212 20:39:01.097725 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.097931 kubelet[1941]: E0212 20:39:01.097907 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.097931 kubelet[1941]: W0212 20:39:01.097923 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.098059 kubelet[1941]: E0212 20:39:01.098042 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.099404 kubelet[1941]: E0212 20:39:01.099384 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.099404 kubelet[1941]: W0212 20:39:01.099399 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.099550 kubelet[1941]: E0212 20:39:01.099537 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.099632 kubelet[1941]: E0212 20:39:01.099564 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.099716 kubelet[1941]: W0212 20:39:01.099703 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.099902 kubelet[1941]: E0212 20:39:01.099880 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.100035 kubelet[1941]: E0212 20:39:01.100024 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.100113 kubelet[1941]: W0212 20:39:01.100102 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.100197 kubelet[1941]: E0212 20:39:01.100188 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.103772 kubelet[1941]: E0212 20:39:01.101311 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.106914 kubelet[1941]: W0212 20:39:01.106880 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.107028 kubelet[1941]: E0212 20:39:01.106932 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.113025 kubelet[1941]: E0212 20:39:01.113001 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.113168 kubelet[1941]: W0212 20:39:01.113153 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.113786 kubelet[1941]: E0212 20:39:01.113759 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.113786 kubelet[1941]: W0212 20:39:01.113781 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.113883 kubelet[1941]: E0212 20:39:01.113806 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.113965 kubelet[1941]: E0212 20:39:01.113953 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.120858 env[1059]: time="2024-02-12T20:39:01.120465446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5589dfb5b8-wb6sd,Uid:6675b7fd-9ca8-493a-ba15-d3d2f3e1915e,Namespace:calico-system,Attempt:0,}" Feb 12 20:39:01.124938 kubelet[1941]: E0212 20:39:01.124853 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.124938 kubelet[1941]: W0212 20:39:01.124873 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.124938 kubelet[1941]: E0212 20:39:01.124894 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.151957 env[1059]: time="2024-02-12T20:39:01.151881967Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:39:01.152149 env[1059]: time="2024-02-12T20:39:01.151933223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:39:01.152149 env[1059]: time="2024-02-12T20:39:01.151947710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:39:01.152274 env[1059]: time="2024-02-12T20:39:01.152252040Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/83e9913dfb3010d362d3029fb0fb45449a2857f9672739b462906729d628283e pid=2321 runtime=io.containerd.runc.v2 Feb 12 20:39:01.172206 systemd[1]: Started cri-containerd-83e9913dfb3010d362d3029fb0fb45449a2857f9672739b462906729d628283e.scope. Feb 12 20:39:01.186822 kubelet[1941]: E0212 20:39:01.186659 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.186822 kubelet[1941]: W0212 20:39:01.186677 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.186822 kubelet[1941]: E0212 20:39:01.186700 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.187285 kubelet[1941]: E0212 20:39:01.187109 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.187285 kubelet[1941]: W0212 20:39:01.187120 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.187285 kubelet[1941]: E0212 20:39:01.187149 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.187631 kubelet[1941]: E0212 20:39:01.187498 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.187631 kubelet[1941]: W0212 20:39:01.187508 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.187631 kubelet[1941]: E0212 20:39:01.187523 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.187973 kubelet[1941]: E0212 20:39:01.187815 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.187973 kubelet[1941]: W0212 20:39:01.187825 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.187973 kubelet[1941]: E0212 20:39:01.187850 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.188718 kubelet[1941]: E0212 20:39:01.188164 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.188718 kubelet[1941]: W0212 20:39:01.188173 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.188718 kubelet[1941]: E0212 20:39:01.188187 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.189080 kubelet[1941]: E0212 20:39:01.188966 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.189080 kubelet[1941]: W0212 20:39:01.188976 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.189080 kubelet[1941]: E0212 20:39:01.188992 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.189406 kubelet[1941]: E0212 20:39:01.189276 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.189406 kubelet[1941]: W0212 20:39:01.189286 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.189406 kubelet[1941]: E0212 20:39:01.189389 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.189672 kubelet[1941]: E0212 20:39:01.189628 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.189672 kubelet[1941]: W0212 20:39:01.189638 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.189916 kubelet[1941]: E0212 20:39:01.189792 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.190203 kubelet[1941]: E0212 20:39:01.190035 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.190203 kubelet[1941]: W0212 20:39:01.190045 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.190203 kubelet[1941]: E0212 20:39:01.190099 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.190494 kubelet[1941]: E0212 20:39:01.190452 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.190494 kubelet[1941]: W0212 20:39:01.190462 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.190732 kubelet[1941]: E0212 20:39:01.190611 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.191018 kubelet[1941]: E0212 20:39:01.190849 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.191018 kubelet[1941]: W0212 20:39:01.190859 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.191018 kubelet[1941]: E0212 20:39:01.190915 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.191434 kubelet[1941]: E0212 20:39:01.191297 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.191434 kubelet[1941]: W0212 20:39:01.191307 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.191434 kubelet[1941]: E0212 20:39:01.191357 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.191789 kubelet[1941]: E0212 20:39:01.191731 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.191789 kubelet[1941]: W0212 20:39:01.191740 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.191914 kubelet[1941]: E0212 20:39:01.191883 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.192305 kubelet[1941]: E0212 20:39:01.192295 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.192405 kubelet[1941]: W0212 20:39:01.192394 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.192539 kubelet[1941]: E0212 20:39:01.192530 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.192791 kubelet[1941]: E0212 20:39:01.192782 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.192877 kubelet[1941]: W0212 20:39:01.192866 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.192972 kubelet[1941]: E0212 20:39:01.192962 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.193253 kubelet[1941]: E0212 20:39:01.193212 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.193352 kubelet[1941]: W0212 20:39:01.193341 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.193487 kubelet[1941]: E0212 20:39:01.193477 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.193736 kubelet[1941]: E0212 20:39:01.193703 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.193856 kubelet[1941]: W0212 20:39:01.193842 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.194017 kubelet[1941]: E0212 20:39:01.194007 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.194389 kubelet[1941]: E0212 20:39:01.194378 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.194515 kubelet[1941]: W0212 20:39:01.194503 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.194706 kubelet[1941]: E0212 20:39:01.194655 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.194841 kubelet[1941]: E0212 20:39:01.194831 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.194928 kubelet[1941]: W0212 20:39:01.194916 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.196501 kubelet[1941]: E0212 20:39:01.196488 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.196669 kubelet[1941]: E0212 20:39:01.196660 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.196834 kubelet[1941]: W0212 20:39:01.196820 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.197022 kubelet[1941]: E0212 20:39:01.197005 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.197570 kubelet[1941]: E0212 20:39:01.197559 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.197668 kubelet[1941]: W0212 20:39:01.197657 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.197839 kubelet[1941]: E0212 20:39:01.197829 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.197970 kubelet[1941]: E0212 20:39:01.197961 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.198059 kubelet[1941]: W0212 20:39:01.198048 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.198299 kubelet[1941]: E0212 20:39:01.198277 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.198441 kubelet[1941]: E0212 20:39:01.198432 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.198532 kubelet[1941]: W0212 20:39:01.198521 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.198696 kubelet[1941]: E0212 20:39:01.198686 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.198865 kubelet[1941]: E0212 20:39:01.198838 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.198942 kubelet[1941]: W0212 20:39:01.198931 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.199099 kubelet[1941]: E0212 20:39:01.199089 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.203946 kubelet[1941]: E0212 20:39:01.203924 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.204922 kubelet[1941]: W0212 20:39:01.204906 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.205129 kubelet[1941]: E0212 20:39:01.205119 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.210000 audit: BPF prog-id=127 op=LOAD Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2321 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653939313364666233303130643336326433303239666230666234 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2321 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653939313364666233303130643336326433303239666230666234 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit: BPF prog-id=128 op=LOAD Feb 12 20:39:01.211000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000279fc0 items=0 ppid=2321 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653939313364666233303130643336326433303239666230666234 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.211000 audit: BPF prog-id=129 op=LOAD Feb 12 20:39:01.211000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000370008 items=0 ppid=2321 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653939313364666233303130643336326433303239666230666234 Feb 12 20:39:01.212000 audit: BPF prog-id=129 op=UNLOAD Feb 12 20:39:01.212000 audit: BPF prog-id=128 op=UNLOAD Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { perfmon } for pid=2330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit[2330]: AVC avc: denied { bpf } for pid=2330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.212000 audit: BPF prog-id=130 op=LOAD Feb 12 20:39:01.212000 audit[2330]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000370418 items=0 ppid=2321 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833653939313364666233303130643336326433303239666230666234 Feb 12 20:39:01.218652 env[1059]: time="2024-02-12T20:39:01.218600077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xwbbk,Uid:89133db5-9819-4cc4-ab76-3dbeff7e1d91,Namespace:calico-system,Attempt:0,}" Feb 12 20:39:01.222017 kubelet[1941]: E0212 20:39:01.221989 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:01.222157 kubelet[1941]: W0212 20:39:01.222142 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:01.222304 kubelet[1941]: E0212 20:39:01.222292 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:01.242141 env[1059]: time="2024-02-12T20:39:01.242078387Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:39:01.242421 env[1059]: time="2024-02-12T20:39:01.242378199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:39:01.242500 env[1059]: time="2024-02-12T20:39:01.242412753Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:39:01.242777 env[1059]: time="2024-02-12T20:39:01.242723737Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede pid=2383 runtime=io.containerd.runc.v2 Feb 12 20:39:01.267272 env[1059]: time="2024-02-12T20:39:01.267184777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5589dfb5b8-wb6sd,Uid:6675b7fd-9ca8-493a-ba15-d3d2f3e1915e,Namespace:calico-system,Attempt:0,} returns sandbox id \"83e9913dfb3010d362d3029fb0fb45449a2857f9672739b462906729d628283e\"" Feb 12 20:39:01.269691 env[1059]: time="2024-02-12T20:39:01.269664784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 20:39:01.270028 systemd[1]: Started cri-containerd-74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede.scope. Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.305000 audit: BPF prog-id=131 op=LOAD Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2383 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666635333164656637633830383030633866313933393731363734 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2383 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666635333164656637633830383030633866313933393731363734 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit: BPF prog-id=132 op=LOAD Feb 12 20:39:01.306000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002a7d00 items=0 ppid=2383 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666635333164656637633830383030633866313933393731363734 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit: BPF prog-id=133 op=LOAD Feb 12 20:39:01.306000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002a7d48 items=0 ppid=2383 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666635333164656637633830383030633866313933393731363734 Feb 12 20:39:01.306000 audit: BPF prog-id=133 op=UNLOAD Feb 12 20:39:01.306000 audit: BPF prog-id=132 op=UNLOAD Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { perfmon } for pid=2395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit[2395]: AVC avc: denied { bpf } for pid=2395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:01.306000 audit: BPF prog-id=134 op=LOAD Feb 12 20:39:01.306000 audit[2395]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fe158 items=0 ppid=2383 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666635333164656637633830383030633866313933393731363734 Feb 12 20:39:01.329895 env[1059]: time="2024-02-12T20:39:01.329806894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xwbbk,Uid:89133db5-9819-4cc4-ab76-3dbeff7e1d91,Namespace:calico-system,Attempt:0,} returns sandbox id \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\"" Feb 12 20:39:01.682000 audit[2425]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:01.682000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffebac625b0 a2=0 a3=7ffebac6259c items=0 ppid=2077 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.682000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:01.683000 audit[2425]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:01.683000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffebac625b0 a2=0 a3=0 items=0 ppid=2077 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:01.683000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:03.036846 kubelet[1941]: E0212 20:39:03.036387 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:03.068842 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2372116171.mount: Deactivated successfully. Feb 12 20:39:05.036451 kubelet[1941]: E0212 20:39:05.036093 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:05.973542 env[1059]: time="2024-02-12T20:39:05.973323053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:05.977851 env[1059]: time="2024-02-12T20:39:05.977804730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:05.982358 env[1059]: time="2024-02-12T20:39:05.982133352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:05.987049 env[1059]: time="2024-02-12T20:39:05.986972208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:05.989091 env[1059]: time="2024-02-12T20:39:05.989004957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 20:39:05.993332 env[1059]: time="2024-02-12T20:39:05.993281931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:39:06.018489 env[1059]: time="2024-02-12T20:39:06.018452667Z" level=info msg="CreateContainer within sandbox \"83e9913dfb3010d362d3029fb0fb45449a2857f9672739b462906729d628283e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 20:39:06.033557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794169773.mount: Deactivated successfully. Feb 12 20:39:06.044401 env[1059]: time="2024-02-12T20:39:06.044357249Z" level=info msg="CreateContainer within sandbox \"83e9913dfb3010d362d3029fb0fb45449a2857f9672739b462906729d628283e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0ca99ad644de5367cdb12b7205e066a91350e75d517e395905b45e238d4d2833\"" Feb 12 20:39:06.047173 env[1059]: time="2024-02-12T20:39:06.047137508Z" level=info msg="StartContainer for \"0ca99ad644de5367cdb12b7205e066a91350e75d517e395905b45e238d4d2833\"" Feb 12 20:39:06.072596 systemd[1]: Started cri-containerd-0ca99ad644de5367cdb12b7205e066a91350e75d517e395905b45e238d4d2833.scope. Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.099583 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 20:39:06.099857 kernel: audit: type=1400 audit(1707770346.096:1076): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.108262 kernel: audit: type=1400 audit(1707770346.096:1077): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.114251 kernel: audit: type=1400 audit(1707770346.096:1078): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.125883 kernel: audit: type=1400 audit(1707770346.096:1079): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.125957 kernel: audit: type=1400 audit(1707770346.096:1080): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.133929 kernel: audit: type=1400 audit(1707770346.096:1081): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.133997 kernel: audit: type=1400 audit(1707770346.096:1082): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.135095 kernel: audit: type=1400 audit(1707770346.096:1083): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.145272 kernel: audit: type=1400 audit(1707770346.096:1084): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.152618 kernel: audit: type=1400 audit(1707770346.097:1085): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.097000 audit: BPF prog-id=135 op=LOAD Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:06.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613939616436343464653533363763646231326237323035653036 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:06.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613939616436343464653533363763646231326237323035653036 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit: BPF prog-id=136 op=LOAD Feb 12 20:39:06.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c4bc0 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:06.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613939616436343464653533363763646231326237323035653036 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit: BPF prog-id=137 op=LOAD Feb 12 20:39:06.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c4c08 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:06.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613939616436343464653533363763646231326237323035653036 Feb 12 20:39:06.103000 audit: BPF prog-id=137 op=UNLOAD Feb 12 20:39:06.103000 audit: BPF prog-id=136 op=UNLOAD Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:06.103000 audit: BPF prog-id=138 op=LOAD Feb 12 20:39:06.103000 audit[2436]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c5018 items=0 ppid=2321 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:06.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063613939616436343464653533363763646231326237323035653036 Feb 12 20:39:06.164162 env[1059]: time="2024-02-12T20:39:06.164121782Z" level=info msg="StartContainer for \"0ca99ad644de5367cdb12b7205e066a91350e75d517e395905b45e238d4d2833\" returns successfully" Feb 12 20:39:07.037289 kubelet[1941]: E0212 20:39:07.037116 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:07.212938 kubelet[1941]: I0212 20:39:07.212868 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5589dfb5b8-wb6sd" podStartSLOduration=2.492215696 podCreationTimestamp="2024-02-12 20:39:00 +0000 UTC" firstStartedPulling="2024-02-12 20:39:01.269181057 +0000 UTC m=+19.383232215" lastFinishedPulling="2024-02-12 20:39:05.989723784 +0000 UTC m=+24.103775052" observedRunningTime="2024-02-12 20:39:07.211881539 +0000 UTC m=+25.325932747" watchObservedRunningTime="2024-02-12 20:39:07.212758533 +0000 UTC m=+25.326809741" Feb 12 20:39:07.222020 kubelet[1941]: E0212 20:39:07.221949 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.223215 kubelet[1941]: W0212 20:39:07.223180 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.223722 kubelet[1941]: E0212 20:39:07.223658 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.224493 kubelet[1941]: E0212 20:39:07.224468 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.224674 kubelet[1941]: W0212 20:39:07.224646 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.225560 kubelet[1941]: E0212 20:39:07.225503 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.226510 kubelet[1941]: E0212 20:39:07.226486 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.226671 kubelet[1941]: W0212 20:39:07.226645 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.226845 kubelet[1941]: E0212 20:39:07.226823 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.227632 kubelet[1941]: E0212 20:39:07.227608 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.227808 kubelet[1941]: W0212 20:39:07.227782 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.227969 kubelet[1941]: E0212 20:39:07.227947 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.230830 kubelet[1941]: E0212 20:39:07.230772 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.230830 kubelet[1941]: W0212 20:39:07.230824 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.231215 kubelet[1941]: E0212 20:39:07.230884 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.231399 kubelet[1941]: E0212 20:39:07.231217 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.231399 kubelet[1941]: W0212 20:39:07.231285 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.231399 kubelet[1941]: E0212 20:39:07.231316 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.232048 kubelet[1941]: E0212 20:39:07.231959 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.232048 kubelet[1941]: W0212 20:39:07.232003 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.232048 kubelet[1941]: E0212 20:39:07.232036 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.233383 kubelet[1941]: E0212 20:39:07.233324 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.233383 kubelet[1941]: W0212 20:39:07.233358 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.233620 kubelet[1941]: E0212 20:39:07.233395 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.234067 kubelet[1941]: E0212 20:39:07.234007 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.234067 kubelet[1941]: W0212 20:39:07.234050 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.234360 kubelet[1941]: E0212 20:39:07.234085 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.236050 kubelet[1941]: E0212 20:39:07.236009 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.236050 kubelet[1941]: W0212 20:39:07.236048 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.236318 kubelet[1941]: E0212 20:39:07.236084 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.236672 kubelet[1941]: E0212 20:39:07.236633 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.236672 kubelet[1941]: W0212 20:39:07.236668 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.236847 kubelet[1941]: E0212 20:39:07.236700 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.237165 kubelet[1941]: E0212 20:39:07.237127 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.237165 kubelet[1941]: W0212 20:39:07.237163 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.237425 kubelet[1941]: E0212 20:39:07.237195 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.238474 kubelet[1941]: E0212 20:39:07.238421 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.238474 kubelet[1941]: W0212 20:39:07.238457 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.238676 kubelet[1941]: E0212 20:39:07.238491 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.239053 kubelet[1941]: E0212 20:39:07.238998 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.239053 kubelet[1941]: W0212 20:39:07.239036 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.239301 kubelet[1941]: E0212 20:39:07.239070 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.239663 kubelet[1941]: E0212 20:39:07.239607 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.239663 kubelet[1941]: W0212 20:39:07.239646 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.239847 kubelet[1941]: E0212 20:39:07.239678 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.240164 kubelet[1941]: E0212 20:39:07.240125 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.240164 kubelet[1941]: W0212 20:39:07.240161 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.240414 kubelet[1941]: E0212 20:39:07.240193 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.240963 kubelet[1941]: E0212 20:39:07.240925 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.240963 kubelet[1941]: W0212 20:39:07.240960 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.241154 kubelet[1941]: E0212 20:39:07.241030 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.241569 kubelet[1941]: E0212 20:39:07.241531 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.241569 kubelet[1941]: W0212 20:39:07.241566 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.241747 kubelet[1941]: E0212 20:39:07.241633 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.242094 kubelet[1941]: E0212 20:39:07.242054 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.242094 kubelet[1941]: W0212 20:39:07.242090 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.242373 kubelet[1941]: E0212 20:39:07.242133 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.242707 kubelet[1941]: E0212 20:39:07.242666 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.242707 kubelet[1941]: W0212 20:39:07.242701 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.242961 kubelet[1941]: E0212 20:39:07.242909 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.243360 kubelet[1941]: E0212 20:39:07.243326 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.243360 kubelet[1941]: W0212 20:39:07.243357 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.243645 kubelet[1941]: E0212 20:39:07.243578 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.243948 kubelet[1941]: E0212 20:39:07.243912 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.243948 kubelet[1941]: W0212 20:39:07.243946 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.244409 kubelet[1941]: E0212 20:39:07.244362 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.244925 kubelet[1941]: E0212 20:39:07.244867 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.244925 kubelet[1941]: W0212 20:39:07.244904 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.245164 kubelet[1941]: E0212 20:39:07.245113 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.245637 kubelet[1941]: E0212 20:39:07.245578 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.245637 kubelet[1941]: W0212 20:39:07.245616 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.245885 kubelet[1941]: E0212 20:39:07.245830 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.246505 kubelet[1941]: E0212 20:39:07.246414 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.246505 kubelet[1941]: W0212 20:39:07.246449 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.246505 kubelet[1941]: E0212 20:39:07.246488 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.247475 kubelet[1941]: E0212 20:39:07.247409 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.247475 kubelet[1941]: W0212 20:39:07.247463 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.247662 kubelet[1941]: E0212 20:39:07.247508 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.248380 kubelet[1941]: E0212 20:39:07.248326 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.248380 kubelet[1941]: W0212 20:39:07.248364 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.248649 kubelet[1941]: E0212 20:39:07.248603 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.248981 kubelet[1941]: E0212 20:39:07.248925 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.248981 kubelet[1941]: W0212 20:39:07.248963 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.249159 kubelet[1941]: E0212 20:39:07.248994 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.249607 kubelet[1941]: E0212 20:39:07.249551 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.249607 kubelet[1941]: W0212 20:39:07.249591 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.249820 kubelet[1941]: E0212 20:39:07.249624 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.251015 kubelet[1941]: E0212 20:39:07.250957 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:07.251015 kubelet[1941]: W0212 20:39:07.250990 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:07.251507 kubelet[1941]: E0212 20:39:07.251022 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:07.655911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount358279429.mount: Deactivated successfully. Feb 12 20:39:08.191274 kubelet[1941]: I0212 20:39:08.190520 1941 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:39:08.251934 kubelet[1941]: E0212 20:39:08.251885 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.252184 kubelet[1941]: W0212 20:39:08.252160 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.252376 kubelet[1941]: E0212 20:39:08.252357 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.252979 kubelet[1941]: E0212 20:39:08.252961 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.253143 kubelet[1941]: W0212 20:39:08.253122 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.253359 kubelet[1941]: E0212 20:39:08.253341 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.254022 kubelet[1941]: E0212 20:39:08.254003 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.254210 kubelet[1941]: W0212 20:39:08.254167 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.254409 kubelet[1941]: E0212 20:39:08.254390 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.254962 kubelet[1941]: E0212 20:39:08.254943 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.255113 kubelet[1941]: W0212 20:39:08.255093 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.255285 kubelet[1941]: E0212 20:39:08.255249 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.255815 kubelet[1941]: E0212 20:39:08.255796 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.255949 kubelet[1941]: W0212 20:39:08.255929 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.256067 kubelet[1941]: E0212 20:39:08.256051 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.256565 kubelet[1941]: E0212 20:39:08.256546 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.256702 kubelet[1941]: W0212 20:39:08.256682 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.256816 kubelet[1941]: E0212 20:39:08.256800 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.257473 kubelet[1941]: E0212 20:39:08.257455 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.257698 kubelet[1941]: W0212 20:39:08.257677 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.257817 kubelet[1941]: E0212 20:39:08.257801 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.258320 kubelet[1941]: E0212 20:39:08.258302 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.258456 kubelet[1941]: W0212 20:39:08.258436 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.258601 kubelet[1941]: E0212 20:39:08.258575 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.259097 kubelet[1941]: E0212 20:39:08.259079 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.259215 kubelet[1941]: W0212 20:39:08.259197 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.259399 kubelet[1941]: E0212 20:39:08.259381 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.259895 kubelet[1941]: E0212 20:39:08.259876 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.260112 kubelet[1941]: W0212 20:39:08.260092 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.260307 kubelet[1941]: E0212 20:39:08.260290 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.260743 kubelet[1941]: E0212 20:39:08.260725 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.260874 kubelet[1941]: W0212 20:39:08.260855 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.261078 kubelet[1941]: E0212 20:39:08.261060 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.261594 kubelet[1941]: E0212 20:39:08.261577 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.261726 kubelet[1941]: W0212 20:39:08.261707 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.261871 kubelet[1941]: E0212 20:39:08.261854 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.357946 kubelet[1941]: E0212 20:39:08.357897 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.357946 kubelet[1941]: W0212 20:39:08.357939 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.358363 kubelet[1941]: E0212 20:39:08.357982 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.358541 kubelet[1941]: E0212 20:39:08.358497 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.358541 kubelet[1941]: W0212 20:39:08.358530 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.358713 kubelet[1941]: E0212 20:39:08.358561 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.358974 kubelet[1941]: E0212 20:39:08.358936 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.358974 kubelet[1941]: W0212 20:39:08.358968 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.359158 kubelet[1941]: E0212 20:39:08.359000 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.359467 kubelet[1941]: E0212 20:39:08.359434 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.359604 kubelet[1941]: W0212 20:39:08.359479 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.359604 kubelet[1941]: E0212 20:39:08.359524 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.359908 kubelet[1941]: E0212 20:39:08.359878 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.359908 kubelet[1941]: W0212 20:39:08.359906 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.360115 kubelet[1941]: E0212 20:39:08.359948 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.360344 kubelet[1941]: E0212 20:39:08.360309 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.360344 kubelet[1941]: W0212 20:39:08.360339 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.360543 kubelet[1941]: E0212 20:39:08.360381 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.360845 kubelet[1941]: E0212 20:39:08.360814 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.360845 kubelet[1941]: W0212 20:39:08.360842 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.361139 kubelet[1941]: E0212 20:39:08.361102 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.361389 kubelet[1941]: E0212 20:39:08.361354 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.361389 kubelet[1941]: W0212 20:39:08.361387 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.361790 kubelet[1941]: E0212 20:39:08.361745 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.361790 kubelet[1941]: W0212 20:39:08.361777 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.362001 kubelet[1941]: E0212 20:39:08.361808 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.362157 kubelet[1941]: E0212 20:39:08.362115 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.362157 kubelet[1941]: W0212 20:39:08.362147 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.362377 kubelet[1941]: E0212 20:39:08.362175 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.362583 kubelet[1941]: E0212 20:39:08.362530 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.362583 kubelet[1941]: W0212 20:39:08.362563 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.362761 kubelet[1941]: E0212 20:39:08.362591 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.362987 kubelet[1941]: E0212 20:39:08.362946 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.362987 kubelet[1941]: W0212 20:39:08.362978 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.363160 kubelet[1941]: E0212 20:39:08.363008 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.363444 kubelet[1941]: E0212 20:39:08.363413 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.363843 kubelet[1941]: E0212 20:39:08.363812 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.363843 kubelet[1941]: W0212 20:39:08.363841 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.364085 kubelet[1941]: E0212 20:39:08.363884 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.364291 kubelet[1941]: E0212 20:39:08.364194 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.364404 kubelet[1941]: W0212 20:39:08.364295 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.364404 kubelet[1941]: E0212 20:39:08.364341 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.364720 kubelet[1941]: E0212 20:39:08.364631 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.364720 kubelet[1941]: W0212 20:39:08.364663 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.364986 kubelet[1941]: E0212 20:39:08.364951 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.364986 kubelet[1941]: W0212 20:39:08.364983 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.365137 kubelet[1941]: E0212 20:39:08.365011 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.365332 kubelet[1941]: E0212 20:39:08.365302 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.366029 kubelet[1941]: E0212 20:39:08.366002 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.366290 kubelet[1941]: W0212 20:39:08.366175 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.366483 kubelet[1941]: E0212 20:39:08.366459 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:08.368159 kubelet[1941]: E0212 20:39:08.368131 1941 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:39:08.368394 kubelet[1941]: W0212 20:39:08.368367 1941 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:39:08.368544 kubelet[1941]: E0212 20:39:08.368523 1941 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:39:09.036316 kubelet[1941]: E0212 20:39:09.036130 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:09.756266 env[1059]: time="2024-02-12T20:39:09.756120336Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:09.760140 env[1059]: time="2024-02-12T20:39:09.760087030Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:09.764616 env[1059]: time="2024-02-12T20:39:09.764565624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:09.768871 env[1059]: time="2024-02-12T20:39:09.768821490Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:09.772539 env[1059]: time="2024-02-12T20:39:09.772403323Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:39:09.780947 env[1059]: time="2024-02-12T20:39:09.780887804Z" level=info msg="CreateContainer within sandbox \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:39:09.802272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3482389657.mount: Deactivated successfully. Feb 12 20:39:09.803468 env[1059]: time="2024-02-12T20:39:09.802543791Z" level=info msg="CreateContainer within sandbox \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd\"" Feb 12 20:39:09.806124 env[1059]: time="2024-02-12T20:39:09.804182572Z" level=info msg="StartContainer for \"516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd\"" Feb 12 20:39:09.848607 systemd[1]: run-containerd-runc-k8s.io-516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd-runc.m0U1W1.mount: Deactivated successfully. Feb 12 20:39:09.851735 systemd[1]: Started cri-containerd-516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd.scope. Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f93cdbbd898 items=0 ppid=2383 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:09.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366430353430396539333836343435303538303261343266383935 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit: BPF prog-id=139 op=LOAD Feb 12 20:39:09.868000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002f7778 items=0 ppid=2383 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:09.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366430353430396539333836343435303538303261343266383935 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.868000 audit: BPF prog-id=140 op=LOAD Feb 12 20:39:09.868000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002f77c8 items=0 ppid=2383 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:09.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366430353430396539333836343435303538303261343266383935 Feb 12 20:39:09.869000 audit: BPF prog-id=140 op=UNLOAD Feb 12 20:39:09.869000 audit: BPF prog-id=139 op=UNLOAD Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:09.869000 audit: BPF prog-id=141 op=LOAD Feb 12 20:39:09.869000 audit[2534]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002f7858 items=0 ppid=2383 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:09.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531366430353430396539333836343435303538303261343266383935 Feb 12 20:39:09.906757 env[1059]: time="2024-02-12T20:39:09.906653670Z" level=info msg="StartContainer for \"516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd\" returns successfully" Feb 12 20:39:09.928040 systemd[1]: cri-containerd-516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd.scope: Deactivated successfully. Feb 12 20:39:09.932000 audit: BPF prog-id=141 op=UNLOAD Feb 12 20:39:10.063645 env[1059]: time="2024-02-12T20:39:10.063510599Z" level=info msg="shim disconnected" id=516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd Feb 12 20:39:10.063913 env[1059]: time="2024-02-12T20:39:10.063892154Z" level=warning msg="cleaning up after shim disconnected" id=516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd namespace=k8s.io Feb 12 20:39:10.064009 env[1059]: time="2024-02-12T20:39:10.063992562Z" level=info msg="cleaning up dead shim" Feb 12 20:39:10.074861 env[1059]: time="2024-02-12T20:39:10.074315490Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:39:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2571 runtime=io.containerd.runc.v2\n" Feb 12 20:39:10.202051 env[1059]: time="2024-02-12T20:39:10.201996986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:39:10.793762 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-516d05409e938644505802a42f8954d39e71707727b6876babffc0f5607351dd-rootfs.mount: Deactivated successfully. Feb 12 20:39:11.036741 kubelet[1941]: E0212 20:39:11.036694 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:12.058698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount476621130.mount: Deactivated successfully. Feb 12 20:39:13.036591 kubelet[1941]: E0212 20:39:13.036515 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:15.036323 kubelet[1941]: E0212 20:39:15.036212 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:17.038543 kubelet[1941]: E0212 20:39:17.038458 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:18.307755 env[1059]: time="2024-02-12T20:39:18.307666846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:18.311960 env[1059]: time="2024-02-12T20:39:18.311904179Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:18.321329 env[1059]: time="2024-02-12T20:39:18.321183325Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:18.332909 env[1059]: time="2024-02-12T20:39:18.332830100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:18.335813 env[1059]: time="2024-02-12T20:39:18.335688700Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:39:18.344252 env[1059]: time="2024-02-12T20:39:18.344133621Z" level=info msg="CreateContainer within sandbox \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:39:18.370717 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1458694935.mount: Deactivated successfully. Feb 12 20:39:18.382174 env[1059]: time="2024-02-12T20:39:18.382040928Z" level=info msg="CreateContainer within sandbox \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c\"" Feb 12 20:39:18.383985 env[1059]: time="2024-02-12T20:39:18.383929518Z" level=info msg="StartContainer for \"ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c\"" Feb 12 20:39:18.435119 systemd[1]: Started cri-containerd-ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c.scope. Feb 12 20:39:18.446503 systemd[1]: run-containerd-runc-k8s.io-ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c-runc.gyKVCW.mount: Deactivated successfully. Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.464510 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 12 20:39:18.464566 kernel: audit: type=1400 audit(1707770358.463:1101): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fdeb5b8a7a8 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:18.473581 kernel: audit: type=1300 audit(1707770358.463:1101): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fdeb5b8a7a8 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:18.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623037326437346233313962303162653330366132643436383032 Feb 12 20:39:18.478801 kernel: audit: type=1327 audit(1707770358.463:1101): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623037326437346233313962303162653330366132643436383032 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.485250 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.536579 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.536645 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.536666 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.536695 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.536716 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.536741 kernel: audit: type=1400 audit(1707770358.463:1102): avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.463000 audit: BPF prog-id=142 op=LOAD Feb 12 20:39:18.463000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00028e528 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:18.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623037326437346233313962303162653330366132643436383032 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit: BPF prog-id=143 op=LOAD Feb 12 20:39:18.467000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00028e578 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:18.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623037326437346233313962303162653330366132643436383032 Feb 12 20:39:18.467000 audit: BPF prog-id=143 op=UNLOAD Feb 12 20:39:18.467000 audit: BPF prog-id=142 op=UNLOAD Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:18.467000 audit: BPF prog-id=144 op=LOAD Feb 12 20:39:18.467000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00028e608 items=0 ppid=2383 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:18.467000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563623037326437346233313962303162653330366132643436383032 Feb 12 20:39:19.036314 kubelet[1941]: E0212 20:39:19.036270 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:19.579865 env[1059]: time="2024-02-12T20:39:19.579714683Z" level=info msg="StartContainer for \"ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c\" returns successfully" Feb 12 20:39:21.036778 kubelet[1941]: E0212 20:39:21.036708 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:21.792216 env[1059]: time="2024-02-12T20:39:21.792092399Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:39:21.799508 systemd[1]: cri-containerd-ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c.scope: Deactivated successfully. Feb 12 20:39:21.803000 audit: BPF prog-id=144 op=UNLOAD Feb 12 20:39:21.847820 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c-rootfs.mount: Deactivated successfully. Feb 12 20:39:21.852570 kubelet[1941]: I0212 20:39:21.852311 1941 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:39:21.863630 env[1059]: time="2024-02-12T20:39:21.863531750Z" level=info msg="shim disconnected" id=ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c Feb 12 20:39:21.864035 env[1059]: time="2024-02-12T20:39:21.863960494Z" level=warning msg="cleaning up after shim disconnected" id=ecb072d74b319b01be306a2d468024ffd84c7a548673ae616f45db562ab1177c namespace=k8s.io Feb 12 20:39:21.864211 env[1059]: time="2024-02-12T20:39:21.864174706Z" level=info msg="cleaning up dead shim" Feb 12 20:39:21.883701 env[1059]: time="2024-02-12T20:39:21.883659907Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:39:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2646 runtime=io.containerd.runc.v2\n" Feb 12 20:39:21.900589 kubelet[1941]: I0212 20:39:21.899860 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:39:21.905831 systemd[1]: Created slice kubepods-burstable-podb67891ae_c631_4d75_818c_22698cbae89d.slice. Feb 12 20:39:21.914873 kubelet[1941]: I0212 20:39:21.914835 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:39:21.915788 kubelet[1941]: I0212 20:39:21.915771 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:39:21.921404 systemd[1]: Created slice kubepods-burstable-pod3e201877_9981_4f9b_8d31_15c451ea4fdf.slice. Feb 12 20:39:21.926650 systemd[1]: Created slice kubepods-besteffort-pod3b120abf_26d5_489b_8047_5b7fd2a48f60.slice. Feb 12 20:39:21.971560 kubelet[1941]: I0212 20:39:21.971537 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hshth\" (UniqueName: \"kubernetes.io/projected/b67891ae-c631-4d75-818c-22698cbae89d-kube-api-access-hshth\") pod \"coredns-5d78c9869d-xrbs7\" (UID: \"b67891ae-c631-4d75-818c-22698cbae89d\") " pod="kube-system/coredns-5d78c9869d-xrbs7" Feb 12 20:39:21.971865 kubelet[1941]: I0212 20:39:21.971841 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3b120abf-26d5-489b-8047-5b7fd2a48f60-tigera-ca-bundle\") pod \"calico-kube-controllers-74958d95b4-dtbmt\" (UID: \"3b120abf-26d5-489b-8047-5b7fd2a48f60\") " pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" Feb 12 20:39:21.971942 kubelet[1941]: I0212 20:39:21.971922 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/b67891ae-c631-4d75-818c-22698cbae89d-config-volume\") pod \"coredns-5d78c9869d-xrbs7\" (UID: \"b67891ae-c631-4d75-818c-22698cbae89d\") " pod="kube-system/coredns-5d78c9869d-xrbs7" Feb 12 20:39:21.971991 kubelet[1941]: I0212 20:39:21.971968 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/3e201877-9981-4f9b-8d31-15c451ea4fdf-config-volume\") pod \"coredns-5d78c9869d-99q2w\" (UID: \"3e201877-9981-4f9b-8d31-15c451ea4fdf\") " pod="kube-system/coredns-5d78c9869d-99q2w" Feb 12 20:39:21.972023 kubelet[1941]: I0212 20:39:21.971996 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bxrcf\" (UniqueName: \"kubernetes.io/projected/3e201877-9981-4f9b-8d31-15c451ea4fdf-kube-api-access-bxrcf\") pod \"coredns-5d78c9869d-99q2w\" (UID: \"3e201877-9981-4f9b-8d31-15c451ea4fdf\") " pod="kube-system/coredns-5d78c9869d-99q2w" Feb 12 20:39:21.972068 kubelet[1941]: I0212 20:39:21.972052 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zxr54\" (UniqueName: \"kubernetes.io/projected/3b120abf-26d5-489b-8047-5b7fd2a48f60-kube-api-access-zxr54\") pod \"calico-kube-controllers-74958d95b4-dtbmt\" (UID: \"3b120abf-26d5-489b-8047-5b7fd2a48f60\") " pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" Feb 12 20:39:22.209550 env[1059]: time="2024-02-12T20:39:22.209354565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-xrbs7,Uid:b67891ae-c631-4d75-818c-22698cbae89d,Namespace:kube-system,Attempt:0,}" Feb 12 20:39:22.225280 env[1059]: time="2024-02-12T20:39:22.225132236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-99q2w,Uid:3e201877-9981-4f9b-8d31-15c451ea4fdf,Namespace:kube-system,Attempt:0,}" Feb 12 20:39:22.229834 env[1059]: time="2024-02-12T20:39:22.229610242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74958d95b4-dtbmt,Uid:3b120abf-26d5-489b-8047-5b7fd2a48f60,Namespace:calico-system,Attempt:0,}" Feb 12 20:39:22.430668 env[1059]: time="2024-02-12T20:39:22.430524493Z" level=error msg="Failed to destroy network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.431176 env[1059]: time="2024-02-12T20:39:22.431144075Z" level=error msg="encountered an error cleaning up failed sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.431349 env[1059]: time="2024-02-12T20:39:22.431303033Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-99q2w,Uid:3e201877-9981-4f9b-8d31-15c451ea4fdf,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.432859 kubelet[1941]: E0212 20:39:22.431636 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.432859 kubelet[1941]: E0212 20:39:22.431692 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-99q2w" Feb 12 20:39:22.432859 kubelet[1941]: E0212 20:39:22.431721 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-99q2w" Feb 12 20:39:22.433200 kubelet[1941]: E0212 20:39:22.431793 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-99q2w_kube-system(3e201877-9981-4f9b-8d31-15c451ea4fdf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-99q2w_kube-system(3e201877-9981-4f9b-8d31-15c451ea4fdf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-99q2w" podUID=3e201877-9981-4f9b-8d31-15c451ea4fdf Feb 12 20:39:22.441572 env[1059]: time="2024-02-12T20:39:22.441526020Z" level=error msg="Failed to destroy network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.442006 env[1059]: time="2024-02-12T20:39:22.441976745Z" level=error msg="encountered an error cleaning up failed sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.442158 env[1059]: time="2024-02-12T20:39:22.442103502Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-xrbs7,Uid:b67891ae-c631-4d75-818c-22698cbae89d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.442471 kubelet[1941]: E0212 20:39:22.442442 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.442543 kubelet[1941]: E0212 20:39:22.442500 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-xrbs7" Feb 12 20:39:22.442543 kubelet[1941]: E0212 20:39:22.442531 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-xrbs7" Feb 12 20:39:22.442628 kubelet[1941]: E0212 20:39:22.442593 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-xrbs7_kube-system(b67891ae-c631-4d75-818c-22698cbae89d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-xrbs7_kube-system(b67891ae-c631-4d75-818c-22698cbae89d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-xrbs7" podUID=b67891ae-c631-4d75-818c-22698cbae89d Feb 12 20:39:22.450241 env[1059]: time="2024-02-12T20:39:22.450174273Z" level=error msg="Failed to destroy network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.450725 env[1059]: time="2024-02-12T20:39:22.450694148Z" level=error msg="encountered an error cleaning up failed sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.450852 env[1059]: time="2024-02-12T20:39:22.450821187Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74958d95b4-dtbmt,Uid:3b120abf-26d5-489b-8047-5b7fd2a48f60,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.452468 kubelet[1941]: E0212 20:39:22.451160 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.452468 kubelet[1941]: E0212 20:39:22.451216 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" Feb 12 20:39:22.452468 kubelet[1941]: E0212 20:39:22.451259 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" Feb 12 20:39:22.452609 kubelet[1941]: E0212 20:39:22.451323 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-74958d95b4-dtbmt_calico-system(3b120abf-26d5-489b-8047-5b7fd2a48f60)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-74958d95b4-dtbmt_calico-system(3b120abf-26d5-489b-8047-5b7fd2a48f60)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" podUID=3b120abf-26d5-489b-8047-5b7fd2a48f60 Feb 12 20:39:22.603425 kubelet[1941]: I0212 20:39:22.603383 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:22.607584 env[1059]: time="2024-02-12T20:39:22.606785383Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:39:22.610185 env[1059]: time="2024-02-12T20:39:22.610043642Z" level=info msg="StopPodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\"" Feb 12 20:39:22.617736 kubelet[1941]: I0212 20:39:22.617010 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:22.621889 env[1059]: time="2024-02-12T20:39:22.619754277Z" level=info msg="StopPodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\"" Feb 12 20:39:22.632429 kubelet[1941]: I0212 20:39:22.631504 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:22.634586 env[1059]: time="2024-02-12T20:39:22.632955577Z" level=info msg="StopPodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\"" Feb 12 20:39:22.711912 env[1059]: time="2024-02-12T20:39:22.711854128Z" level=error msg="StopPodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" failed" error="failed to destroy network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.712567 kubelet[1941]: E0212 20:39:22.712382 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:22.712567 kubelet[1941]: E0212 20:39:22.712447 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a} Feb 12 20:39:22.712567 kubelet[1941]: E0212 20:39:22.712498 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3e201877-9981-4f9b-8d31-15c451ea4fdf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:39:22.712567 kubelet[1941]: E0212 20:39:22.712537 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3e201877-9981-4f9b-8d31-15c451ea4fdf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-99q2w" podUID=3e201877-9981-4f9b-8d31-15c451ea4fdf Feb 12 20:39:22.716661 env[1059]: time="2024-02-12T20:39:22.716600487Z" level=error msg="StopPodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" failed" error="failed to destroy network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.716976 kubelet[1941]: E0212 20:39:22.716864 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:22.716976 kubelet[1941]: E0212 20:39:22.716891 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0} Feb 12 20:39:22.716976 kubelet[1941]: E0212 20:39:22.716928 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b67891ae-c631-4d75-818c-22698cbae89d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:39:22.716976 kubelet[1941]: E0212 20:39:22.716958 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b67891ae-c631-4d75-818c-22698cbae89d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-xrbs7" podUID=b67891ae-c631-4d75-818c-22698cbae89d Feb 12 20:39:22.732462 env[1059]: time="2024-02-12T20:39:22.732413644Z" level=error msg="StopPodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" failed" error="failed to destroy network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:22.732821 kubelet[1941]: E0212 20:39:22.732792 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:22.732884 kubelet[1941]: E0212 20:39:22.732856 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe} Feb 12 20:39:22.732916 kubelet[1941]: E0212 20:39:22.732901 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b120abf-26d5-489b-8047-5b7fd2a48f60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:39:22.732988 kubelet[1941]: E0212 20:39:22.732952 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b120abf-26d5-489b-8047-5b7fd2a48f60\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" podUID=3b120abf-26d5-489b-8047-5b7fd2a48f60 Feb 12 20:39:22.848700 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0-shm.mount: Deactivated successfully. Feb 12 20:39:23.047018 systemd[1]: Created slice kubepods-besteffort-pod2ac59062_8b16_48ca_8928_9777b4540cb6.slice. Feb 12 20:39:23.054157 env[1059]: time="2024-02-12T20:39:23.054054889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sbdjq,Uid:2ac59062-8b16-48ca-8928-9777b4540cb6,Namespace:calico-system,Attempt:0,}" Feb 12 20:39:23.178435 env[1059]: time="2024-02-12T20:39:23.178380590Z" level=error msg="Failed to destroy network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:23.180514 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead-shm.mount: Deactivated successfully. Feb 12 20:39:23.181511 env[1059]: time="2024-02-12T20:39:23.181470012Z" level=error msg="encountered an error cleaning up failed sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:23.181649 env[1059]: time="2024-02-12T20:39:23.181616748Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sbdjq,Uid:2ac59062-8b16-48ca-8928-9777b4540cb6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:23.182383 kubelet[1941]: E0212 20:39:23.181943 1941 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:23.182383 kubelet[1941]: E0212 20:39:23.181999 1941 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:23.182383 kubelet[1941]: E0212 20:39:23.182025 1941 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-sbdjq" Feb 12 20:39:23.182599 kubelet[1941]: E0212 20:39:23.182080 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-sbdjq_calico-system(2ac59062-8b16-48ca-8928-9777b4540cb6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-sbdjq_calico-system(2ac59062-8b16-48ca-8928-9777b4540cb6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:23.638327 kubelet[1941]: I0212 20:39:23.637334 1941 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:23.640476 env[1059]: time="2024-02-12T20:39:23.640381368Z" level=info msg="StopPodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\"" Feb 12 20:39:23.702683 env[1059]: time="2024-02-12T20:39:23.702553461Z" level=error msg="StopPodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" failed" error="failed to destroy network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:39:23.703526 kubelet[1941]: E0212 20:39:23.703156 1941 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:23.703526 kubelet[1941]: E0212 20:39:23.703276 1941 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead} Feb 12 20:39:23.703526 kubelet[1941]: E0212 20:39:23.703379 1941 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2ac59062-8b16-48ca-8928-9777b4540cb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:39:23.703526 kubelet[1941]: E0212 20:39:23.703453 1941 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2ac59062-8b16-48ca-8928-9777b4540cb6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-sbdjq" podUID=2ac59062-8b16-48ca-8928-9777b4540cb6 Feb 12 20:39:30.584323 kubelet[1941]: I0212 20:39:30.584275 1941 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 20:39:30.816901 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:39:30.817013 kernel: audit: type=1325 audit(1707770370.807:1108): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:30.817045 kernel: audit: type=1300 audit(1707770370.807:1108): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff4492f3c0 a2=0 a3=7fff4492f3ac items=0 ppid=2077 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:30.807000 audit[2866]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:30.807000 audit[2866]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff4492f3c0 a2=0 a3=7fff4492f3ac items=0 ppid=2077 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:30.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:30.821249 kernel: audit: type=1327 audit(1707770370.807:1108): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:30.807000 audit[2866]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:30.830798 kernel: audit: type=1325 audit(1707770370.807:1109): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2866 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:30.830848 kernel: audit: type=1300 audit(1707770370.807:1109): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fff4492f3c0 a2=0 a3=7fff4492f3ac items=0 ppid=2077 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:30.807000 audit[2866]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7fff4492f3c0 a2=0 a3=7fff4492f3ac items=0 ppid=2077 pid=2866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:30.833532 kernel: audit: type=1327 audit(1707770370.807:1109): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:30.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:32.010455 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3100563657.mount: Deactivated successfully. Feb 12 20:39:32.498848 env[1059]: time="2024-02-12T20:39:32.498699537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:32.504643 env[1059]: time="2024-02-12T20:39:32.504552500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:32.509703 env[1059]: time="2024-02-12T20:39:32.509621083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:32.515484 env[1059]: time="2024-02-12T20:39:32.515407481Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:32.520567 env[1059]: time="2024-02-12T20:39:32.517064368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:39:32.549560 env[1059]: time="2024-02-12T20:39:32.549516462Z" level=info msg="CreateContainer within sandbox \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:39:32.568935 env[1059]: time="2024-02-12T20:39:32.568878473Z" level=info msg="CreateContainer within sandbox \"74ff531def7c80800c8f19397167410fd74e468c34f47c5ec5534b2029e5aede\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe\"" Feb 12 20:39:32.570626 env[1059]: time="2024-02-12T20:39:32.570594660Z" level=info msg="StartContainer for \"6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe\"" Feb 12 20:39:32.594771 systemd[1]: Started cri-containerd-6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe.scope. Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff6df9bbb38 items=0 ppid=2383 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:32.644798 kernel: audit: type=1400 audit(1707770372.632:1110): avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.644925 kernel: audit: type=1300 audit(1707770372.632:1110): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff6df9bbb38 items=0 ppid=2383 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:32.645583 kernel: audit: type=1327 audit(1707770372.632:1110): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664626661383162656630303139373036616232316139653539386634 Feb 12 20:39:32.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664626661383162656630303139373036616232316139653539386634 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.655324 kernel: audit: type=1400 audit(1707770372.632:1111): avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit: BPF prog-id=145 op=LOAD Feb 12 20:39:32.632000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000dbb88 items=0 ppid=2383 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:32.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664626661383162656630303139373036616232316139653539386634 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.632000 audit: BPF prog-id=146 op=LOAD Feb 12 20:39:32.632000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000dbbd8 items=0 ppid=2383 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:32.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664626661383162656630303139373036616232316139653539386634 Feb 12 20:39:32.633000 audit: BPF prog-id=146 op=UNLOAD Feb 12 20:39:32.633000 audit: BPF prog-id=145 op=UNLOAD Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:32.633000 audit: BPF prog-id=147 op=LOAD Feb 12 20:39:32.633000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000dbc68 items=0 ppid=2383 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:32.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664626661383162656630303139373036616232316139653539386634 Feb 12 20:39:32.683359 env[1059]: time="2024-02-12T20:39:32.683282465Z" level=info msg="StartContainer for \"6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe\" returns successfully" Feb 12 20:39:32.829102 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:39:32.829428 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:39:33.708161 kubelet[1941]: I0212 20:39:33.708057 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xwbbk" podStartSLOduration=2.506924043 podCreationTimestamp="2024-02-12 20:39:00 +0000 UTC" firstStartedPulling="2024-02-12 20:39:01.33109094 +0000 UTC m=+19.445142098" lastFinishedPulling="2024-02-12 20:39:32.522404069 +0000 UTC m=+50.636455278" observedRunningTime="2024-02-12 20:39:33.697474323 +0000 UTC m=+51.811525501" watchObservedRunningTime="2024-02-12 20:39:33.698237223 +0000 UTC m=+51.812288391" Feb 12 20:39:33.708985 systemd[1]: run-containerd-runc-k8s.io-6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe-runc.SfmQuV.mount: Deactivated successfully. Feb 12 20:39:34.038051 env[1059]: time="2024-02-12T20:39:34.038016370Z" level=info msg="StopPodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\"" Feb 12 20:39:34.340000 audit[2989]: AVC avc: denied { write } for pid=2989 comm="tee" name="fd" dev="proc" ino=26394 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.340000 audit[2989]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5403095d a2=241 a3=1b6 items=1 ppid=2984 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.340000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:39:34.340000 audit: PATH item=0 name="/dev/fd/63" inode=26389 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.340000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.382000 audit[3020]: AVC avc: denied { write } for pid=3020 comm="tee" name="fd" dev="proc" ino=25229 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.382000 audit[3020]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe4a69295d a2=241 a3=1b6 items=1 ppid=2990 pid=3020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.382000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:39:34.382000 audit: PATH item=0 name="/dev/fd/63" inode=25226 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.382000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.402000 audit[3033]: AVC avc: denied { write } for pid=3033 comm="tee" name="fd" dev="proc" ino=25237 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.402000 audit[3033]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff508a495f a2=241 a3=1b6 items=1 ppid=2994 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.402000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:39:34.402000 audit: PATH item=0 name="/dev/fd/63" inode=25234 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.402000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.410000 audit[3028]: AVC avc: denied { write } for pid=3028 comm="tee" name="fd" dev="proc" ino=25244 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.410000 audit[3028]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5592d94e a2=241 a3=1b6 items=1 ppid=2993 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.410000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:39:34.410000 audit: PATH item=0 name="/dev/fd/63" inode=25231 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.410000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.414000 audit[3026]: AVC avc: denied { write } for pid=3026 comm="tee" name="fd" dev="proc" ino=26443 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.414000 audit[3026]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd8caa95e a2=241 a3=1b6 items=1 ppid=2996 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.414000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:39:34.414000 audit: PATH item=0 name="/dev/fd/63" inode=26430 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.414000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.429000 audit[3045]: AVC avc: denied { write } for pid=3045 comm="tee" name="fd" dev="proc" ino=26459 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.429000 audit[3045]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd89ce95d a2=241 a3=1b6 items=1 ppid=2999 pid=3045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.429000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:39:34.429000 audit: PATH item=0 name="/dev/fd/63" inode=26437 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.429000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.429000 audit[3047]: AVC avc: denied { write } for pid=3047 comm="tee" name="fd" dev="proc" ino=26462 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:39:34.429000 audit[3047]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc93c2d94d a2=241 a3=1b6 items=1 ppid=3000 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:34.429000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:39:34.429000 audit: PATH item=0 name="/dev/fd/63" inode=26440 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:39:34.429000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:39:34.717400 systemd[1]: run-containerd-runc-k8s.io-6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe-runc.U8Xngl.mount: Deactivated successfully. Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.125 [INFO][2966] k8s.go 578: Cleaning up netns ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.125 [INFO][2966] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" iface="eth0" netns="/var/run/netns/cni-42538f1b-d1dd-1262-df79-207aff69acdc" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.126 [INFO][2966] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" iface="eth0" netns="/var/run/netns/cni-42538f1b-d1dd-1262-df79-207aff69acdc" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.128 [INFO][2966] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" iface="eth0" netns="/var/run/netns/cni-42538f1b-d1dd-1262-df79-207aff69acdc" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.128 [INFO][2966] k8s.go 585: Releasing IP address(es) ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.128 [INFO][2966] utils.go 188: Calico CNI releasing IP address ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.658 [INFO][2972] ipam_plugin.go 415: Releasing address using handleID ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.713 [INFO][2972] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.713 [INFO][2972] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.772 [WARNING][2972] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.772 [INFO][2972] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.775 [INFO][2972] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:34.778275 env[1059]: 2024-02-12 20:39:34.776 [INFO][2966] k8s.go 591: Teardown processing complete. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:34.781616 env[1059]: time="2024-02-12T20:39:34.781047489Z" level=info msg="TearDown network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" successfully" Feb 12 20:39:34.781616 env[1059]: time="2024-02-12T20:39:34.781094157Z" level=info msg="StopPodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" returns successfully" Feb 12 20:39:34.780467 systemd[1]: run-netns-cni\x2d42538f1b\x2dd1dd\x2d1262\x2ddf79\x2d207aff69acdc.mount: Deactivated successfully. Feb 12 20:39:34.782543 env[1059]: time="2024-02-12T20:39:34.782290110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-99q2w,Uid:3e201877-9981-4f9b-8d31-15c451ea4fdf,Namespace:kube-system,Attempt:1,}" Feb 12 20:39:35.009931 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:39:35.010120 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibc1e83717b6: link becomes ready Feb 12 20:39:35.019457 systemd-networkd[975]: calibc1e83717b6: Link UP Feb 12 20:39:35.019697 systemd-networkd[975]: calibc1e83717b6: Gained carrier Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.852 [INFO][3093] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.868 [INFO][3093] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0 coredns-5d78c9869d- kube-system 3e201877-9981-4f9b-8d31-15c451ea4fdf 728 0 2024-02-12 20:38:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-6-02325721ca.novalocal coredns-5d78c9869d-99q2w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calibc1e83717b6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.868 [INFO][3093] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.928 [INFO][3107] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" HandleID="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.943 [INFO][3107] ipam_plugin.go 268: Auto assigning IP ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" HandleID="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002beb30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-6-02325721ca.novalocal", "pod":"coredns-5d78c9869d-99q2w", "timestamp":"2024-02-12 20:39:34.928716274 +0000 UTC"}, Hostname:"ci-3510-3-2-6-02325721ca.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.943 [INFO][3107] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.943 [INFO][3107] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.944 [INFO][3107] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6-02325721ca.novalocal' Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.946 [INFO][3107] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.955 [INFO][3107] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.963 [INFO][3107] ipam.go 489: Trying affinity for 192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.966 [INFO][3107] ipam.go 155: Attempting to load block cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.971 [INFO][3107] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.971 [INFO][3107] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.0/26 handle="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.973 [INFO][3107] ipam.go 1682: Creating new handle: k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0 Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.978 [INFO][3107] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.0/26 handle="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.986 [INFO][3107] ipam.go 1216: Successfully claimed IPs: [192.168.40.1/26] block=192.168.40.0/26 handle="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.986 [INFO][3107] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.1/26] handle="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.986 [INFO][3107] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:35.045171 env[1059]: 2024-02-12 20:39:34.986 [INFO][3107] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.1/26] IPv6=[] ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" HandleID="k8s-pod-network.d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.046258 env[1059]: 2024-02-12 20:39:34.989 [INFO][3093] k8s.go 385: Populated endpoint ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"3e201877-9981-4f9b-8d31-15c451ea4fdf", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"", Pod:"coredns-5d78c9869d-99q2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc1e83717b6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:35.046258 env[1059]: 2024-02-12 20:39:34.990 [INFO][3093] k8s.go 386: Calico CNI using IPs: [192.168.40.1/32] ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.046258 env[1059]: 2024-02-12 20:39:34.990 [INFO][3093] dataplane_linux.go 68: Setting the host side veth name to calibc1e83717b6 ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.046258 env[1059]: 2024-02-12 20:39:35.006 [INFO][3093] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.046258 env[1059]: 2024-02-12 20:39:35.006 [INFO][3093] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"3e201877-9981-4f9b-8d31-15c451ea4fdf", ResourceVersion:"728", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0", Pod:"coredns-5d78c9869d-99q2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc1e83717b6", MAC:"26:35:36:80:14:bc", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:35.046258 env[1059]: 2024-02-12 20:39:35.035 [INFO][3093] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0" Namespace="kube-system" Pod="coredns-5d78c9869d-99q2w" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:35.084600 env[1059]: time="2024-02-12T20:39:35.084541623Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:39:35.084773 env[1059]: time="2024-02-12T20:39:35.084749663Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:39:35.084861 env[1059]: time="2024-02-12T20:39:35.084839672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:39:35.085042 env[1059]: time="2024-02-12T20:39:35.085017115Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0 pid=3157 runtime=io.containerd.runc.v2 Feb 12 20:39:35.101420 systemd[1]: Started cri-containerd-d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0.scope. Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.132000 audit: BPF prog-id=148 op=LOAD Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3157 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616264643732613232396262386461623663656232343565386263 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3157 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616264643732613232396262386461623663656232343565386263 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.136000 audit: BPF prog-id=149 op=LOAD Feb 12 20:39:35.136000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000389300 items=0 ppid=3157 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.136000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616264643732613232396262386461623663656232343565386263 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.137000 audit: BPF prog-id=150 op=LOAD Feb 12 20:39:35.137000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000389348 items=0 ppid=3157 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616264643732613232396262386461623663656232343565386263 Feb 12 20:39:35.137000 audit: BPF prog-id=150 op=UNLOAD Feb 12 20:39:35.137000 audit: BPF prog-id=149 op=UNLOAD Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.138000 audit: BPF prog-id=151 op=LOAD Feb 12 20:39:35.138000 audit[3168]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000389758 items=0 ppid=3157 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434616264643732613232396262386461623663656232343565386263 Feb 12 20:39:35.176843 env[1059]: time="2024-02-12T20:39:35.176779992Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-99q2w,Uid:3e201877-9981-4f9b-8d31-15c451ea4fdf,Namespace:kube-system,Attempt:1,} returns sandbox id \"d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0\"" Feb 12 20:39:35.179865 env[1059]: time="2024-02-12T20:39:35.179827275Z" level=info msg="CreateContainer within sandbox \"d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:39:35.207857 env[1059]: time="2024-02-12T20:39:35.207802366Z" level=info msg="CreateContainer within sandbox \"d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"660e6b2e592264018d53f14d204bccc8da251648cc4f809637aa3f050e44af14\"" Feb 12 20:39:35.208787 env[1059]: time="2024-02-12T20:39:35.208751526Z" level=info msg="StartContainer for \"660e6b2e592264018d53f14d204bccc8da251648cc4f809637aa3f050e44af14\"" Feb 12 20:39:35.232258 systemd[1]: Started cri-containerd-660e6b2e592264018d53f14d204bccc8da251648cc4f809637aa3f050e44af14.scope. Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit: BPF prog-id=152 op=LOAD Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3157 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306536623265353932323634303138643533663134643230346263 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3157 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306536623265353932323634303138643533663134643230346263 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit: BPF prog-id=153 op=LOAD Feb 12 20:39:35.252000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002b4ae0 items=0 ppid=3157 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306536623265353932323634303138643533663134643230346263 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit: BPF prog-id=154 op=LOAD Feb 12 20:39:35.252000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002b4b28 items=0 ppid=3157 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306536623265353932323634303138643533663134643230346263 Feb 12 20:39:35.252000 audit: BPF prog-id=154 op=UNLOAD Feb 12 20:39:35.252000 audit: BPF prog-id=153 op=UNLOAD Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.252000 audit: BPF prog-id=155 op=LOAD Feb 12 20:39:35.252000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002b4f38 items=0 ppid=3157 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306536623265353932323634303138643533663134643230346263 Feb 12 20:39:35.274417 env[1059]: time="2024-02-12T20:39:35.274282451Z" level=info msg="StartContainer for \"660e6b2e592264018d53f14d204bccc8da251648cc4f809637aa3f050e44af14\" returns successfully" Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.430000 audit: BPF prog-id=156 op=LOAD Feb 12 20:39:35.430000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff87d71630 a2=70 a3=7f577efda000 items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.431000 audit: BPF prog-id=156 op=UNLOAD Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit: BPF prog-id=157 op=LOAD Feb 12 20:39:35.431000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff87d71630 a2=70 a3=6e items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.431000 audit: BPF prog-id=157 op=UNLOAD Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff87d715e0 a2=70 a3=470860 items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.431000 audit: BPF prog-id=158 op=LOAD Feb 12 20:39:35.431000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff87d715c0 a2=70 a3=7fff87d71630 items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.432000 audit: BPF prog-id=158 op=UNLOAD Feb 12 20:39:35.432000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.432000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff87d716a0 a2=70 a3=0 items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.432000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.432000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff87d71690 a2=70 a3=0 items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.432000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.432000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff87d716d0 a2=70 a3=fe00 items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.433000 audit: BPF prog-id=159 op=LOAD Feb 12 20:39:35.433000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff87d715f0 a2=70 a3=ffffffff items=0 ppid=2991 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.433000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:39:35.445000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.445000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe273eeb50 a2=70 a3=ffff items=0 ppid=2991 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:39:35.445000 audit[3267]: AVC avc: denied { bpf } for pid=3267 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:35.445000 audit[3267]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe273eea20 a2=70 a3=3 items=0 ppid=2991 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:39:35.458000 audit: BPF prog-id=159 op=UNLOAD Feb 12 20:39:35.629000 audit[3291]: NETFILTER_CFG table=mangle:97 family=2 entries=19 op=nft_register_chain pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:35.629000 audit[3291]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd33a5b3b0 a2=0 a3=7ffd33a5b39c items=0 ppid=2991 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.629000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:35.638000 audit[3290]: NETFILTER_CFG table=nat:98 family=2 entries=16 op=nft_register_chain pid=3290 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:35.638000 audit[3290]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffd3a4ded0 a2=0 a3=0 items=0 ppid=2991 pid=3290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.638000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:35.643000 audit[3289]: NETFILTER_CFG table=raw:99 family=2 entries=19 op=nft_register_chain pid=3289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:35.643000 audit[3289]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe7d54a990 a2=0 a3=0 items=0 ppid=2991 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.643000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:35.703000 audit[3296]: NETFILTER_CFG table=filter:100 family=2 entries=71 op=nft_register_chain pid=3296 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:35.703000 audit[3296]: SYSCALL arch=c000003e syscall=46 success=yes exit=36636 a0=3 a1=7fffd544d2b0 a2=0 a3=7fffd544d29c items=0 ppid=2991 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.703000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:35.753000 audit[3299]: NETFILTER_CFG table=filter:101 family=2 entries=14 op=nft_register_rule pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:35.753000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff11afffe0 a2=0 a3=7fff11afffcc items=0 ppid=2077 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:35.755000 audit[3299]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:35.755000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff11afffe0 a2=0 a3=73696874203a4554 items=0 ppid=2077 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:35.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:36.175319 systemd-networkd[975]: vxlan.calico: Link UP Feb 12 20:39:36.175338 systemd-networkd[975]: vxlan.calico: Gained carrier Feb 12 20:39:36.228000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:36.229500 kernel: kauditd_printk_skb: 277 callbacks suppressed Feb 12 20:39:36.229589 kernel: audit: type=1400 audit(1707770376.228:1179): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:36.228000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:36.228000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002645ee0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:36.252882 kernel: audit: type=1400 audit(1707770376.228:1180): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:36.253055 kernel: audit: type=1300 audit(1707770376.228:1180): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002645ee0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:36.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:36.269333 kernel: audit: type=1327 audit(1707770376.228:1180): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:36.269520 kernel: audit: type=1300 audit(1707770376.228:1179): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f91770 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:36.228000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f91770 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:36.228000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:36.304267 kernel: audit: type=1327 audit(1707770376.228:1179): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:36.656456 systemd-networkd[975]: calibc1e83717b6: Gained IPv6LL Feb 12 20:39:36.695770 kubelet[1941]: I0212 20:39:36.695704 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-99q2w" podStartSLOduration=42.695618208 podCreationTimestamp="2024-02-12 20:38:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:39:35.696005968 +0000 UTC m=+53.810057146" watchObservedRunningTime="2024-02-12 20:39:36.695618208 +0000 UTC m=+54.809669416" Feb 12 20:39:36.733000 audit[3308]: NETFILTER_CFG table=filter:103 family=2 entries=11 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:36.740247 kernel: audit: type=1325 audit(1707770376.733:1181): table=filter:103 family=2 entries=11 op=nft_register_rule pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:36.733000 audit[3308]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcaea6e200 a2=0 a3=7ffcaea6e1ec items=0 ppid=2077 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:36.746296 kernel: audit: type=1300 audit(1707770376.733:1181): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcaea6e200 a2=0 a3=7ffcaea6e1ec items=0 ppid=2077 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:36.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:36.750285 kernel: audit: type=1327 audit(1707770376.733:1181): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:36.746000 audit[3308]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:36.754256 kernel: audit: type=1325 audit(1707770376.746:1182): table=nat:104 family=2 entries=35 op=nft_register_chain pid=3308 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:36.746000 audit[3308]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcaea6e200 a2=0 a3=7ffcaea6e1ec items=0 ppid=2077 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:36.746000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:38.037925 env[1059]: time="2024-02-12T20:39:38.037800285Z" level=info msg="StopPodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\"" Feb 12 20:39:38.041875 env[1059]: time="2024-02-12T20:39:38.037831253Z" level=info msg="StopPodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\"" Feb 12 20:39:38.129989 systemd-networkd[975]: vxlan.calico: Gained IPv6LL Feb 12 20:39:38.187000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:38.187000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0084230e0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:39:38.187000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:39:38.195000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:38.195000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c005382900 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:39:38.195000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:39:38.195000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:38.195000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c0083ee120 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:39:38.195000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.154 [INFO][3334] k8s.go 578: Cleaning up netns ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.154 [INFO][3334] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" iface="eth0" netns="/var/run/netns/cni-304784e5-892f-f7b9-90c0-e5a26c2c06fd" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.154 [INFO][3334] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" iface="eth0" netns="/var/run/netns/cni-304784e5-892f-f7b9-90c0-e5a26c2c06fd" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.154 [INFO][3334] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" iface="eth0" netns="/var/run/netns/cni-304784e5-892f-f7b9-90c0-e5a26c2c06fd" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.154 [INFO][3334] k8s.go 585: Releasing IP address(es) ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.154 [INFO][3334] utils.go 188: Calico CNI releasing IP address ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.185 [INFO][3351] ipam_plugin.go 415: Releasing address using handleID ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.185 [INFO][3351] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.185 [INFO][3351] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.201 [WARNING][3351] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.201 [INFO][3351] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.203 [INFO][3351] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:38.205804 env[1059]: 2024-02-12 20:39:38.204 [INFO][3334] k8s.go 591: Teardown processing complete. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:38.211000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:38.211000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0083ee9f0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:39:38.211000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:39:38.210627 systemd[1]: run-netns-cni\x2d304784e5\x2d892f\x2df7b9\x2d90c0\x2de5a26c2c06fd.mount: Deactivated successfully. Feb 12 20:39:38.212948 env[1059]: time="2024-02-12T20:39:38.212896604Z" level=info msg="TearDown network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" successfully" Feb 12 20:39:38.213050 env[1059]: time="2024-02-12T20:39:38.213030736Z" level=info msg="StopPodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" returns successfully" Feb 12 20:39:38.213828 env[1059]: time="2024-02-12T20:39:38.213786672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-xrbs7,Uid:b67891ae-c631-4d75-818c-22698cbae89d,Namespace:kube-system,Attempt:1,}" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.176 [INFO][3344] k8s.go 578: Cleaning up netns ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.176 [INFO][3344] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" iface="eth0" netns="/var/run/netns/cni-b15549ba-e356-27de-5e25-96778ab29a36" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.176 [INFO][3344] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" iface="eth0" netns="/var/run/netns/cni-b15549ba-e356-27de-5e25-96778ab29a36" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.177 [INFO][3344] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" iface="eth0" netns="/var/run/netns/cni-b15549ba-e356-27de-5e25-96778ab29a36" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.177 [INFO][3344] k8s.go 585: Releasing IP address(es) ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.177 [INFO][3344] utils.go 188: Calico CNI releasing IP address ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.237 [INFO][3355] ipam_plugin.go 415: Releasing address using handleID ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.237 [INFO][3355] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.237 [INFO][3355] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.247 [WARNING][3355] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.247 [INFO][3355] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.248 [INFO][3355] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:38.251685 env[1059]: 2024-02-12 20:39:38.250 [INFO][3344] k8s.go 591: Teardown processing complete. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:38.254386 systemd[1]: run-netns-cni\x2db15549ba\x2de356\x2d27de\x2d5e25\x2d96778ab29a36.mount: Deactivated successfully. Feb 12 20:39:38.257964 env[1059]: time="2024-02-12T20:39:38.257931242Z" level=info msg="TearDown network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" successfully" Feb 12 20:39:38.258046 env[1059]: time="2024-02-12T20:39:38.258028654Z" level=info msg="StopPodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" returns successfully" Feb 12 20:39:38.258677 env[1059]: time="2024-02-12T20:39:38.258651733Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74958d95b4-dtbmt,Uid:3b120abf-26d5-489b-8047-5b7fd2a48f60,Namespace:calico-system,Attempt:1,}" Feb 12 20:39:38.269000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:38.269000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0083ef890 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:39:38.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:39:38.269000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:38.269000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00b3b39a0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:39:38.269000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:39:38.402465 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:39:38.402565 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6bc980cf701: link becomes ready Feb 12 20:39:38.397489 systemd-networkd[975]: cali6bc980cf701: Link UP Feb 12 20:39:38.402620 systemd-networkd[975]: cali6bc980cf701: Gained carrier Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.289 [INFO][3363] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0 coredns-5d78c9869d- kube-system b67891ae-c631-4d75-818c-22698cbae89d 754 0 2024-02-12 20:38:54 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-2-6-02325721ca.novalocal coredns-5d78c9869d-xrbs7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6bc980cf701 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.290 [INFO][3363] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.342 [INFO][3386] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" HandleID="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.356 [INFO][3386] ipam_plugin.go 268: Auto assigning IP ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" HandleID="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000518f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-2-6-02325721ca.novalocal", "pod":"coredns-5d78c9869d-xrbs7", "timestamp":"2024-02-12 20:39:38.34252397 +0000 UTC"}, Hostname:"ci-3510-3-2-6-02325721ca.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.356 [INFO][3386] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.356 [INFO][3386] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.356 [INFO][3386] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6-02325721ca.novalocal' Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.358 [INFO][3386] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.364 [INFO][3386] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.369 [INFO][3386] ipam.go 489: Trying affinity for 192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.371 [INFO][3386] ipam.go 155: Attempting to load block cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.375 [INFO][3386] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.375 [INFO][3386] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.0/26 handle="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.377 [INFO][3386] ipam.go 1682: Creating new handle: k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348 Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.381 [INFO][3386] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.0/26 handle="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.390 [INFO][3386] ipam.go 1216: Successfully claimed IPs: [192.168.40.2/26] block=192.168.40.0/26 handle="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.390 [INFO][3386] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.2/26] handle="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.390 [INFO][3386] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:38.423547 env[1059]: 2024-02-12 20:39:38.390 [INFO][3386] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.2/26] IPv6=[] ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" HandleID="k8s-pod-network.da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.424267 env[1059]: 2024-02-12 20:39:38.392 [INFO][3363] k8s.go 385: Populated endpoint ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"b67891ae-c631-4d75-818c-22698cbae89d", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"", Pod:"coredns-5d78c9869d-xrbs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6bc980cf701", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:38.424267 env[1059]: 2024-02-12 20:39:38.392 [INFO][3363] k8s.go 386: Calico CNI using IPs: [192.168.40.2/32] ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.424267 env[1059]: 2024-02-12 20:39:38.392 [INFO][3363] dataplane_linux.go 68: Setting the host side veth name to cali6bc980cf701 ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.424267 env[1059]: 2024-02-12 20:39:38.405 [INFO][3363] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.424267 env[1059]: 2024-02-12 20:39:38.409 [INFO][3363] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"b67891ae-c631-4d75-818c-22698cbae89d", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348", Pod:"coredns-5d78c9869d-xrbs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6bc980cf701", MAC:"9e:2a:e4:38:f5:e0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:38.424267 env[1059]: 2024-02-12 20:39:38.421 [INFO][3363] k8s.go 491: Wrote updated endpoint to datastore ContainerID="da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348" Namespace="kube-system" Pod="coredns-5d78c9869d-xrbs7" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:38.442668 env[1059]: time="2024-02-12T20:39:38.442607683Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:39:38.442918 env[1059]: time="2024-02-12T20:39:38.442839708Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:39:38.443042 env[1059]: time="2024-02-12T20:39:38.443018394Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:39:38.443470 env[1059]: time="2024-02-12T20:39:38.443426919Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348 pid=3416 runtime=io.containerd.runc.v2 Feb 12 20:39:38.463189 systemd[1]: Started cri-containerd-da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348.scope. Feb 12 20:39:38.477000 audit[3439]: NETFILTER_CFG table=filter:105 family=2 entries=30 op=nft_register_chain pid=3439 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:38.477000 audit[3439]: SYSCALL arch=c000003e syscall=46 success=yes exit=16712 a0=3 a1=7fffdf525290 a2=0 a3=7fffdf52527c items=0 ppid=2991 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.477000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:38.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.490000 audit: BPF prog-id=160 op=LOAD Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3416 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323538356331366434663265663930373631373031616539353836 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3416 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323538356331366434663265663930373631373031616539353836 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.491000 audit: BPF prog-id=161 op=LOAD Feb 12 20:39:38.491000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ddd40 items=0 ppid=3416 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323538356331366434663265663930373631373031616539353836 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit: BPF prog-id=162 op=LOAD Feb 12 20:39:38.493000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ddd88 items=0 ppid=3416 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323538356331366434663265663930373631373031616539353836 Feb 12 20:39:38.493000 audit: BPF prog-id=162 op=UNLOAD Feb 12 20:39:38.493000 audit: BPF prog-id=161 op=UNLOAD Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.493000 audit: BPF prog-id=163 op=LOAD Feb 12 20:39:38.493000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4198 items=0 ppid=3416 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461323538356331366434663265663930373631373031616539353836 Feb 12 20:39:38.513066 systemd-networkd[975]: cali6ae2a683131: Link UP Feb 12 20:39:38.514574 systemd-networkd[975]: cali6ae2a683131: Gained carrier Feb 12 20:39:38.515259 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6ae2a683131: link becomes ready Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.340 [INFO][3375] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0 calico-kube-controllers-74958d95b4- calico-system 3b120abf-26d5-489b-8047-5b7fd2a48f60 755 0 2024-02-12 20:39:01 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:74958d95b4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-2-6-02325721ca.novalocal calico-kube-controllers-74958d95b4-dtbmt eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6ae2a683131 [] []}} ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.341 [INFO][3375] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.394 [INFO][3393] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" HandleID="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.421 [INFO][3393] ipam_plugin.go 268: Auto assigning IP ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" HandleID="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cdc0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-6-02325721ca.novalocal", "pod":"calico-kube-controllers-74958d95b4-dtbmt", "timestamp":"2024-02-12 20:39:38.394185103 +0000 UTC"}, Hostname:"ci-3510-3-2-6-02325721ca.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.423 [INFO][3393] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.423 [INFO][3393] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.423 [INFO][3393] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6-02325721ca.novalocal' Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.426 [INFO][3393] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.433 [INFO][3393] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.452 [INFO][3393] ipam.go 489: Trying affinity for 192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.456 [INFO][3393] ipam.go 155: Attempting to load block cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.460 [INFO][3393] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.461 [INFO][3393] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.0/26 handle="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.472 [INFO][3393] ipam.go 1682: Creating new handle: k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.483 [INFO][3393] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.0/26 handle="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.494 [INFO][3393] ipam.go 1216: Successfully claimed IPs: [192.168.40.3/26] block=192.168.40.0/26 handle="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.495 [INFO][3393] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.3/26] handle="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.495 [INFO][3393] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:38.537179 env[1059]: 2024-02-12 20:39:38.495 [INFO][3393] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.3/26] IPv6=[] ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" HandleID="k8s-pod-network.418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.537891 env[1059]: 2024-02-12 20:39:38.498 [INFO][3375] k8s.go 385: Populated endpoint ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0", GenerateName:"calico-kube-controllers-74958d95b4-", Namespace:"calico-system", SelfLink:"", UID:"3b120abf-26d5-489b-8047-5b7fd2a48f60", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74958d95b4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"", Pod:"calico-kube-controllers-74958d95b4-dtbmt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.40.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ae2a683131", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:38.537891 env[1059]: 2024-02-12 20:39:38.498 [INFO][3375] k8s.go 386: Calico CNI using IPs: [192.168.40.3/32] ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.537891 env[1059]: 2024-02-12 20:39:38.498 [INFO][3375] dataplane_linux.go 68: Setting the host side veth name to cali6ae2a683131 ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.537891 env[1059]: 2024-02-12 20:39:38.515 [INFO][3375] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.537891 env[1059]: 2024-02-12 20:39:38.520 [INFO][3375] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0", GenerateName:"calico-kube-controllers-74958d95b4-", Namespace:"calico-system", SelfLink:"", UID:"3b120abf-26d5-489b-8047-5b7fd2a48f60", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74958d95b4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f", Pod:"calico-kube-controllers-74958d95b4-dtbmt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.40.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ae2a683131", MAC:"aa:33:28:c2:02:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:38.537891 env[1059]: 2024-02-12 20:39:38.535 [INFO][3375] k8s.go 491: Wrote updated endpoint to datastore ContainerID="418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f" Namespace="calico-system" Pod="calico-kube-controllers-74958d95b4-dtbmt" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:38.548097 env[1059]: time="2024-02-12T20:39:38.548040706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-xrbs7,Uid:b67891ae-c631-4d75-818c-22698cbae89d,Namespace:kube-system,Attempt:1,} returns sandbox id \"da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348\"" Feb 12 20:39:38.552569 env[1059]: time="2024-02-12T20:39:38.552542146Z" level=info msg="CreateContainer within sandbox \"da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 20:39:38.565872 env[1059]: time="2024-02-12T20:39:38.565793792Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:39:38.565872 env[1059]: time="2024-02-12T20:39:38.565840349Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:39:38.566138 env[1059]: time="2024-02-12T20:39:38.565854646Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:39:38.570675 env[1059]: time="2024-02-12T20:39:38.566308207Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f pid=3477 runtime=io.containerd.runc.v2 Feb 12 20:39:38.574645 env[1059]: time="2024-02-12T20:39:38.574595195Z" level=info msg="CreateContainer within sandbox \"da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bd876bd0684997049468c64eb6610bc7c93f3835fc7f3bf2c59b675e37593810\"" Feb 12 20:39:38.577206 env[1059]: time="2024-02-12T20:39:38.577176134Z" level=info msg="StartContainer for \"bd876bd0684997049468c64eb6610bc7c93f3835fc7f3bf2c59b675e37593810\"" Feb 12 20:39:38.578000 audit[3490]: NETFILTER_CFG table=filter:106 family=2 entries=50 op=nft_register_chain pid=3490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:38.578000 audit[3490]: SYSCALL arch=c000003e syscall=46 success=yes exit=25136 a0=3 a1=7fff403d3610 a2=0 a3=7fff403d35fc items=0 ppid=2991 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.578000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:38.589651 systemd[1]: Started cri-containerd-418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f.scope. Feb 12 20:39:38.607100 systemd[1]: Started cri-containerd-bd876bd0684997049468c64eb6610bc7c93f3835fc7f3bf2c59b675e37593810.scope. Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.613000 audit: BPF prog-id=164 op=LOAD Feb 12 20:39:38.614000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.614000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3477 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.614000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431386363363832656439613631663865396165326635646635656639 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3477 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431386363363832656439613631663865396165326635646635656639 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.615000 audit: BPF prog-id=165 op=LOAD Feb 12 20:39:38.615000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0150 items=0 ppid=3477 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431386363363832656439613631663865396165326635646635656639 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.619000 audit: BPF prog-id=166 op=LOAD Feb 12 20:39:38.619000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0198 items=0 ppid=3477 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431386363363832656439613631663865396165326635646635656639 Feb 12 20:39:38.619000 audit: BPF prog-id=166 op=UNLOAD Feb 12 20:39:38.620000 audit: BPF prog-id=165 op=UNLOAD Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.620000 audit: BPF prog-id=167 op=LOAD Feb 12 20:39:38.620000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c05a8 items=0 ppid=3477 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431386363363832656439613631663865396165326635646635656639 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit: BPF prog-id=168 op=LOAD Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3416 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264383736626430363834393937303439343638633634656236363130 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3416 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264383736626430363834393937303439343638633634656236363130 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.627000 audit: BPF prog-id=169 op=LOAD Feb 12 20:39:38.627000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003ac4d0 items=0 ppid=3416 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264383736626430363834393937303439343638633634656236363130 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit: BPF prog-id=170 op=LOAD Feb 12 20:39:38.628000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003ac518 items=0 ppid=3416 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264383736626430363834393937303439343638633634656236363130 Feb 12 20:39:38.628000 audit: BPF prog-id=170 op=UNLOAD Feb 12 20:39:38.628000 audit: BPF prog-id=169 op=UNLOAD Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { perfmon } for pid=3506 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit[3506]: AVC avc: denied { bpf } for pid=3506 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:38.628000 audit: BPF prog-id=171 op=LOAD Feb 12 20:39:38.628000 audit[3506]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ac928 items=0 ppid=3416 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264383736626430363834393937303439343638633634656236363130 Feb 12 20:39:38.650624 env[1059]: time="2024-02-12T20:39:38.650560247Z" level=info msg="StartContainer for \"bd876bd0684997049468c64eb6610bc7c93f3835fc7f3bf2c59b675e37593810\" returns successfully" Feb 12 20:39:38.670994 env[1059]: time="2024-02-12T20:39:38.670880656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-74958d95b4-dtbmt,Uid:3b120abf-26d5-489b-8047-5b7fd2a48f60,Namespace:calico-system,Attempt:1,} returns sandbox id \"418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f\"" Feb 12 20:39:38.673106 env[1059]: time="2024-02-12T20:39:38.673070503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 20:39:38.698297 kubelet[1941]: I0212 20:39:38.698275 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-xrbs7" podStartSLOduration=44.698212542 podCreationTimestamp="2024-02-12 20:38:54 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:39:38.696772232 +0000 UTC m=+56.810823400" watchObservedRunningTime="2024-02-12 20:39:38.698212542 +0000 UTC m=+56.812263700" Feb 12 20:39:38.717000 audit[3549]: NETFILTER_CFG table=filter:107 family=2 entries=8 op=nft_register_rule pid=3549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:38.717000 audit[3549]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdd94e6580 a2=0 a3=7ffdd94e656c items=0 ppid=2077 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:38.719000 audit[3549]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=3549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:38.719000 audit[3549]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdd94e6580 a2=0 a3=7ffdd94e656c items=0 ppid=2077 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:38.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:39.039198 env[1059]: time="2024-02-12T20:39:39.039129149Z" level=info msg="StopPodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\"" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.152 [INFO][3566] k8s.go 578: Cleaning up netns ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.153 [INFO][3566] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" iface="eth0" netns="/var/run/netns/cni-60dd96f7-0115-9dd5-ab7a-7fb1c404366f" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.154 [INFO][3566] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" iface="eth0" netns="/var/run/netns/cni-60dd96f7-0115-9dd5-ab7a-7fb1c404366f" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.154 [INFO][3566] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" iface="eth0" netns="/var/run/netns/cni-60dd96f7-0115-9dd5-ab7a-7fb1c404366f" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.154 [INFO][3566] k8s.go 585: Releasing IP address(es) ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.154 [INFO][3566] utils.go 188: Calico CNI releasing IP address ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.184 [INFO][3572] ipam_plugin.go 415: Releasing address using handleID ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.184 [INFO][3572] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.184 [INFO][3572] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.220 [WARNING][3572] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.220 [INFO][3572] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.223 [INFO][3572] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:39.225968 env[1059]: 2024-02-12 20:39:39.224 [INFO][3566] k8s.go 591: Teardown processing complete. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:39.229379 env[1059]: time="2024-02-12T20:39:39.228408102Z" level=info msg="TearDown network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" successfully" Feb 12 20:39:39.229379 env[1059]: time="2024-02-12T20:39:39.228441384Z" level=info msg="StopPodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" returns successfully" Feb 12 20:39:39.228141 systemd[1]: run-netns-cni\x2d60dd96f7\x2d0115\x2d9dd5\x2dab7a\x2d7fb1c404366f.mount: Deactivated successfully. Feb 12 20:39:39.229871 env[1059]: time="2024-02-12T20:39:39.229839064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sbdjq,Uid:2ac59062-8b16-48ca-8928-9777b4540cb6,Namespace:calico-system,Attempt:1,}" Feb 12 20:39:39.400209 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:39:39.400357 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77d9795e49c: link becomes ready Feb 12 20:39:39.402418 systemd-networkd[975]: cali77d9795e49c: Link UP Feb 12 20:39:39.402607 systemd-networkd[975]: cali77d9795e49c: Gained carrier Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.317 [INFO][3579] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0 csi-node-driver- calico-system 2ac59062-8b16-48ca-8928-9777b4540cb6 774 0 2024-02-12 20:39:01 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-2-6-02325721ca.novalocal csi-node-driver-sbdjq eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali77d9795e49c [] []}} ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.317 [INFO][3579] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.352 [INFO][3591] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" HandleID="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.363 [INFO][3591] ipam_plugin.go 268: Auto assigning IP ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" HandleID="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cad0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-2-6-02325721ca.novalocal", "pod":"csi-node-driver-sbdjq", "timestamp":"2024-02-12 20:39:39.35206212 +0000 UTC"}, Hostname:"ci-3510-3-2-6-02325721ca.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.363 [INFO][3591] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.363 [INFO][3591] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.363 [INFO][3591] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6-02325721ca.novalocal' Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.365 [INFO][3591] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.369 [INFO][3591] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.373 [INFO][3591] ipam.go 489: Trying affinity for 192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.376 [INFO][3591] ipam.go 155: Attempting to load block cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.378 [INFO][3591] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.378 [INFO][3591] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.0/26 handle="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.380 [INFO][3591] ipam.go 1682: Creating new handle: k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03 Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.385 [INFO][3591] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.0/26 handle="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.392 [INFO][3591] ipam.go 1216: Successfully claimed IPs: [192.168.40.4/26] block=192.168.40.0/26 handle="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.392 [INFO][3591] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.4/26] handle="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.392 [INFO][3591] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:39.415170 env[1059]: 2024-02-12 20:39:39.392 [INFO][3591] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.4/26] IPv6=[] ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" HandleID="k8s-pod-network.af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.415838 env[1059]: 2024-02-12 20:39:39.393 [INFO][3579] k8s.go 385: Populated endpoint ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2ac59062-8b16-48ca-8928-9777b4540cb6", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"", Pod:"csi-node-driver-sbdjq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77d9795e49c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:39.415838 env[1059]: 2024-02-12 20:39:39.394 [INFO][3579] k8s.go 386: Calico CNI using IPs: [192.168.40.4/32] ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.415838 env[1059]: 2024-02-12 20:39:39.394 [INFO][3579] dataplane_linux.go 68: Setting the host side veth name to cali77d9795e49c ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.415838 env[1059]: 2024-02-12 20:39:39.400 [INFO][3579] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.415838 env[1059]: 2024-02-12 20:39:39.400 [INFO][3579] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2ac59062-8b16-48ca-8928-9777b4540cb6", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03", Pod:"csi-node-driver-sbdjq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77d9795e49c", MAC:"ae:42:d5:8c:89:69", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:39.415838 env[1059]: 2024-02-12 20:39:39.413 [INFO][3579] k8s.go 491: Wrote updated endpoint to datastore ContainerID="af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03" Namespace="calico-system" Pod="csi-node-driver-sbdjq" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:39.439000 audit[3614]: NETFILTER_CFG table=filter:109 family=2 entries=38 op=nft_register_chain pid=3614 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:39:39.439000 audit[3614]: SYSCALL arch=c000003e syscall=46 success=yes exit=19492 a0=3 a1=7ffc3d807a90 a2=0 a3=7ffc3d807a7c items=0 ppid=2991 pid=3614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:39:39.450201 env[1059]: time="2024-02-12T20:39:39.450127220Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:39:39.450201 env[1059]: time="2024-02-12T20:39:39.450174058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:39:39.450469 env[1059]: time="2024-02-12T20:39:39.450428355Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:39:39.450835 env[1059]: time="2024-02-12T20:39:39.450756500Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03 pid=3621 runtime=io.containerd.runc.v2 Feb 12 20:39:39.469278 systemd[1]: Started cri-containerd-af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03.scope. Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.483000 audit: BPF prog-id=172 op=LOAD Feb 12 20:39:39.485000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.485000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3621 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303930316434333232636463326435623136356538356163623062 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3621 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303930316434333232636463326435623136356538356163623062 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.486000 audit: BPF prog-id=173 op=LOAD Feb 12 20:39:39.486000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002c7dc0 items=0 ppid=3621 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303930316434333232636463326435623136356538356163623062 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.488000 audit: BPF prog-id=174 op=LOAD Feb 12 20:39:39.488000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002c7e08 items=0 ppid=3621 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303930316434333232636463326435623136356538356163623062 Feb 12 20:39:39.488000 audit: BPF prog-id=174 op=UNLOAD Feb 12 20:39:39.489000 audit: BPF prog-id=173 op=UNLOAD Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { perfmon } for pid=3631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit[3631]: AVC avc: denied { bpf } for pid=3631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:39.489000 audit: BPF prog-id=175 op=LOAD Feb 12 20:39:39.489000 audit[3631]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000394218 items=0 ppid=3621 pid=3631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166303930316434333232636463326435623136356538356163623062 Feb 12 20:39:39.514455 env[1059]: time="2024-02-12T20:39:39.514399809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-sbdjq,Uid:2ac59062-8b16-48ca-8928-9777b4540cb6,Namespace:calico-system,Attempt:1,} returns sandbox id \"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03\"" Feb 12 20:39:39.537456 systemd-networkd[975]: cali6ae2a683131: Gained IPv6LL Feb 12 20:39:39.775000 audit[3655]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:39.775000 audit[3655]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff8651b9b0 a2=0 a3=7fff8651b99c items=0 ppid=2077 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:39.795000 audit[3655]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:39:39.795000 audit[3655]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff8651b9b0 a2=0 a3=7fff8651b99c items=0 ppid=2077 pid=3655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:39.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:39:40.374288 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3768481172.mount: Deactivated successfully. Feb 12 20:39:40.432693 systemd-networkd[975]: cali6bc980cf701: Gained IPv6LL Feb 12 20:39:40.496581 systemd-networkd[975]: cali77d9795e49c: Gained IPv6LL Feb 12 20:39:42.068462 env[1059]: time="2024-02-12T20:39:42.067038247Z" level=info msg="StopPodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\"" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.140 [WARNING][3677] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"3e201877-9981-4f9b-8d31-15c451ea4fdf", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0", Pod:"coredns-5d78c9869d-99q2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc1e83717b6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.140 [INFO][3677] k8s.go 578: Cleaning up netns ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.140 [INFO][3677] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" iface="eth0" netns="" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.140 [INFO][3677] k8s.go 585: Releasing IP address(es) ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.141 [INFO][3677] utils.go 188: Calico CNI releasing IP address ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.165 [INFO][3683] ipam_plugin.go 415: Releasing address using handleID ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.165 [INFO][3683] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.165 [INFO][3683] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.173 [WARNING][3683] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.173 [INFO][3683] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.175 [INFO][3683] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.178427 env[1059]: 2024-02-12 20:39:42.176 [INFO][3677] k8s.go 591: Teardown processing complete. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.178997 env[1059]: time="2024-02-12T20:39:42.178458392Z" level=info msg="TearDown network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" successfully" Feb 12 20:39:42.178997 env[1059]: time="2024-02-12T20:39:42.178492496Z" level=info msg="StopPodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" returns successfully" Feb 12 20:39:42.179320 env[1059]: time="2024-02-12T20:39:42.179288478Z" level=info msg="RemovePodSandbox for \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\"" Feb 12 20:39:42.179447 env[1059]: time="2024-02-12T20:39:42.179406048Z" level=info msg="Forcibly stopping sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\"" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.239 [WARNING][3701] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"3e201877-9981-4f9b-8d31-15c451ea4fdf", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"d4abdd72a229bb8dab6ceb245e8bc8ba112a65a44770248b061107171b6773c0", Pod:"coredns-5d78c9869d-99q2w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calibc1e83717b6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.239 [INFO][3701] k8s.go 578: Cleaning up netns ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.239 [INFO][3701] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" iface="eth0" netns="" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.239 [INFO][3701] k8s.go 585: Releasing IP address(es) ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.239 [INFO][3701] utils.go 188: Calico CNI releasing IP address ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.265 [INFO][3707] ipam_plugin.go 415: Releasing address using handleID ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.265 [INFO][3707] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.266 [INFO][3707] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.273 [WARNING][3707] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.273 [INFO][3707] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" HandleID="k8s-pod-network.55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--99q2w-eth0" Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.275 [INFO][3707] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.279900 env[1059]: 2024-02-12 20:39:42.278 [INFO][3701] k8s.go 591: Teardown processing complete. ContainerID="55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a" Feb 12 20:39:42.280528 env[1059]: time="2024-02-12T20:39:42.280495382Z" level=info msg="TearDown network for sandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" successfully" Feb 12 20:39:42.284574 env[1059]: time="2024-02-12T20:39:42.284549023Z" level=info msg="RemovePodSandbox \"55b6fa8005d2514dbb851429ecc1d246e94e7853370a02d0184c52e9b7b2691a\" returns successfully" Feb 12 20:39:42.285128 env[1059]: time="2024-02-12T20:39:42.285105176Z" level=info msg="StopPodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\"" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.339 [WARNING][3728] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0", GenerateName:"calico-kube-controllers-74958d95b4-", Namespace:"calico-system", SelfLink:"", UID:"3b120abf-26d5-489b-8047-5b7fd2a48f60", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74958d95b4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f", Pod:"calico-kube-controllers-74958d95b4-dtbmt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.40.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ae2a683131", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.339 [INFO][3728] k8s.go 578: Cleaning up netns ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.339 [INFO][3728] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" iface="eth0" netns="" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.339 [INFO][3728] k8s.go 585: Releasing IP address(es) ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.339 [INFO][3728] utils.go 188: Calico CNI releasing IP address ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.391 [INFO][3734] ipam_plugin.go 415: Releasing address using handleID ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.391 [INFO][3734] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.391 [INFO][3734] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.400 [WARNING][3734] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.400 [INFO][3734] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.401 [INFO][3734] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.404845 env[1059]: 2024-02-12 20:39:42.403 [INFO][3728] k8s.go 591: Teardown processing complete. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.405511 env[1059]: time="2024-02-12T20:39:42.405477776Z" level=info msg="TearDown network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" successfully" Feb 12 20:39:42.405589 env[1059]: time="2024-02-12T20:39:42.405569348Z" level=info msg="StopPodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" returns successfully" Feb 12 20:39:42.407369 env[1059]: time="2024-02-12T20:39:42.407330721Z" level=info msg="RemovePodSandbox for \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\"" Feb 12 20:39:42.407434 env[1059]: time="2024-02-12T20:39:42.407376447Z" level=info msg="Forcibly stopping sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\"" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.481 [WARNING][3755] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0", GenerateName:"calico-kube-controllers-74958d95b4-", Namespace:"calico-system", SelfLink:"", UID:"3b120abf-26d5-489b-8047-5b7fd2a48f60", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"74958d95b4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f", Pod:"calico-kube-controllers-74958d95b4-dtbmt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.40.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6ae2a683131", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.481 [INFO][3755] k8s.go 578: Cleaning up netns ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.481 [INFO][3755] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" iface="eth0" netns="" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.481 [INFO][3755] k8s.go 585: Releasing IP address(es) ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.481 [INFO][3755] utils.go 188: Calico CNI releasing IP address ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.508 [INFO][3761] ipam_plugin.go 415: Releasing address using handleID ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.508 [INFO][3761] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.509 [INFO][3761] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.517 [WARNING][3761] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.517 [INFO][3761] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" HandleID="k8s-pod-network.ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--kube--controllers--74958d95b4--dtbmt-eth0" Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.519 [INFO][3761] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.522089 env[1059]: 2024-02-12 20:39:42.520 [INFO][3755] k8s.go 591: Teardown processing complete. ContainerID="ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe" Feb 12 20:39:42.522590 env[1059]: time="2024-02-12T20:39:42.522117338Z" level=info msg="TearDown network for sandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" successfully" Feb 12 20:39:42.526422 env[1059]: time="2024-02-12T20:39:42.526390340Z" level=info msg="RemovePodSandbox \"ccd8a09376349cff43c0b0f142c3d817442c2bec827f00eeb021b781ee6a9dfe\" returns successfully" Feb 12 20:39:42.526868 env[1059]: time="2024-02-12T20:39:42.526839241Z" level=info msg="StopPodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\"" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.602 [WARNING][3781] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2ac59062-8b16-48ca-8928-9777b4540cb6", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03", Pod:"csi-node-driver-sbdjq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77d9795e49c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.602 [INFO][3781] k8s.go 578: Cleaning up netns ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.602 [INFO][3781] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" iface="eth0" netns="" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.602 [INFO][3781] k8s.go 585: Releasing IP address(es) ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.602 [INFO][3781] utils.go 188: Calico CNI releasing IP address ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.629 [INFO][3787] ipam_plugin.go 415: Releasing address using handleID ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.629 [INFO][3787] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.629 [INFO][3787] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.638 [WARNING][3787] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.638 [INFO][3787] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.639 [INFO][3787] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.643140 env[1059]: 2024-02-12 20:39:42.641 [INFO][3781] k8s.go 591: Teardown processing complete. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.644807 env[1059]: time="2024-02-12T20:39:42.643534376Z" level=info msg="TearDown network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" successfully" Feb 12 20:39:42.644807 env[1059]: time="2024-02-12T20:39:42.643564633Z" level=info msg="StopPodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" returns successfully" Feb 12 20:39:42.644807 env[1059]: time="2024-02-12T20:39:42.643999158Z" level=info msg="RemovePodSandbox for \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\"" Feb 12 20:39:42.644807 env[1059]: time="2024-02-12T20:39:42.644025928Z" level=info msg="Forcibly stopping sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\"" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.711 [WARNING][3808] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"2ac59062-8b16-48ca-8928-9777b4540cb6", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 39, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03", Pod:"csi-node-driver-sbdjq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.40.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77d9795e49c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.711 [INFO][3808] k8s.go 578: Cleaning up netns ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.711 [INFO][3808] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" iface="eth0" netns="" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.711 [INFO][3808] k8s.go 585: Releasing IP address(es) ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.711 [INFO][3808] utils.go 188: Calico CNI releasing IP address ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.739 [INFO][3815] ipam_plugin.go 415: Releasing address using handleID ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.739 [INFO][3815] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.739 [INFO][3815] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.750 [WARNING][3815] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.751 [INFO][3815] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" HandleID="k8s-pod-network.ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-csi--node--driver--sbdjq-eth0" Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.752 [INFO][3815] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.755774 env[1059]: 2024-02-12 20:39:42.754 [INFO][3808] k8s.go 591: Teardown processing complete. ContainerID="ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead" Feb 12 20:39:42.756281 env[1059]: time="2024-02-12T20:39:42.755818731Z" level=info msg="TearDown network for sandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" successfully" Feb 12 20:39:42.759203 env[1059]: time="2024-02-12T20:39:42.759166488Z" level=info msg="RemovePodSandbox \"ba6a9ab03c27f64d7d2c4bcd5db0955e60df56f2eb5d20e7326a6209b50a5ead\" returns successfully" Feb 12 20:39:42.759693 env[1059]: time="2024-02-12T20:39:42.759663900Z" level=info msg="StopPodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\"" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.832 [WARNING][3835] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"b67891ae-c631-4d75-818c-22698cbae89d", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348", Pod:"coredns-5d78c9869d-xrbs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6bc980cf701", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.833 [INFO][3835] k8s.go 578: Cleaning up netns ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.833 [INFO][3835] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" iface="eth0" netns="" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.833 [INFO][3835] k8s.go 585: Releasing IP address(es) ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.833 [INFO][3835] utils.go 188: Calico CNI releasing IP address ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.864 [INFO][3842] ipam_plugin.go 415: Releasing address using handleID ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.864 [INFO][3842] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.864 [INFO][3842] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.873 [WARNING][3842] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.873 [INFO][3842] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.880 [INFO][3842] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:42.886674 env[1059]: 2024-02-12 20:39:42.882 [INFO][3835] k8s.go 591: Teardown processing complete. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:42.886674 env[1059]: time="2024-02-12T20:39:42.886515550Z" level=info msg="TearDown network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" successfully" Feb 12 20:39:42.886674 env[1059]: time="2024-02-12T20:39:42.886582285Z" level=info msg="StopPodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" returns successfully" Feb 12 20:39:42.887406 env[1059]: time="2024-02-12T20:39:42.886995189Z" level=info msg="RemovePodSandbox for \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\"" Feb 12 20:39:42.887406 env[1059]: time="2024-02-12T20:39:42.887022120Z" level=info msg="Forcibly stopping sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\"" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.955 [WARNING][3861] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"b67891ae-c631-4d75-818c-22698cbae89d", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 38, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"da2585c16d4f2ef90761701ae95867eded5f42f39da787d07bae19b8938ef348", Pod:"coredns-5d78c9869d-xrbs7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.40.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6bc980cf701", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.955 [INFO][3861] k8s.go 578: Cleaning up netns ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.955 [INFO][3861] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" iface="eth0" netns="" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.955 [INFO][3861] k8s.go 585: Releasing IP address(es) ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.955 [INFO][3861] utils.go 188: Calico CNI releasing IP address ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.987 [INFO][3867] ipam_plugin.go 415: Releasing address using handleID ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.987 [INFO][3867] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.987 [INFO][3867] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.995 [WARNING][3867] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.996 [INFO][3867] ipam_plugin.go 443: Releasing address using workloadID ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" HandleID="k8s-pod-network.eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-coredns--5d78c9869d--xrbs7-eth0" Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.997 [INFO][3867] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:39:43.000789 env[1059]: 2024-02-12 20:39:42.999 [INFO][3861] k8s.go 591: Teardown processing complete. ContainerID="eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0" Feb 12 20:39:43.001375 env[1059]: time="2024-02-12T20:39:43.000815814Z" level=info msg="TearDown network for sandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" successfully" Feb 12 20:39:43.004182 env[1059]: time="2024-02-12T20:39:43.004138354Z" level=info msg="RemovePodSandbox \"eddfdd14d1103f5982c4a008241ac62570921c2ecac6c0f5daaf4e031fbc64f0\" returns successfully" Feb 12 20:39:43.449552 env[1059]: time="2024-02-12T20:39:43.449470294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:43.452742 env[1059]: time="2024-02-12T20:39:43.452680724Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:43.456070 env[1059]: time="2024-02-12T20:39:43.456038249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:43.459901 env[1059]: time="2024-02-12T20:39:43.459877006Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:43.462399 env[1059]: time="2024-02-12T20:39:43.462322632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 20:39:43.463639 env[1059]: time="2024-02-12T20:39:43.463595659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:39:43.503419 env[1059]: time="2024-02-12T20:39:43.503370458Z" level=info msg="CreateContainer within sandbox \"418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 20:39:43.525459 env[1059]: time="2024-02-12T20:39:43.525422095Z" level=info msg="CreateContainer within sandbox \"418cc682ed9a61f8e9ae2f5df5ef90e4520c8d5cd0cae189c33827cd1f3e0d9f\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2\"" Feb 12 20:39:43.527058 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3188075929.mount: Deactivated successfully. Feb 12 20:39:43.528628 env[1059]: time="2024-02-12T20:39:43.528600345Z" level=info msg="StartContainer for \"2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2\"" Feb 12 20:39:43.557990 systemd[1]: Started cri-containerd-2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2.scope. Feb 12 20:39:43.580256 kernel: kauditd_printk_skb: 269 callbacks suppressed Feb 12 20:39:43.580352 kernel: audit: type=1400 audit(1707770383.575:1268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.580453 kernel: audit: type=1400 audit(1707770383.575:1269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.592584 kernel: audit: type=1400 audit(1707770383.575:1270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.592648 kernel: audit: type=1400 audit(1707770383.575:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.596872 kernel: audit: type=1400 audit(1707770383.575:1272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.605245 kernel: audit: type=1400 audit(1707770383.575:1273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.605296 kernel: audit: type=1400 audit(1707770383.575:1274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.612531 kernel: audit: type=1400 audit(1707770383.575:1275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.612584 kernel: audit: type=1400 audit(1707770383.575:1276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.616139 kernel: audit: type=1400 audit(1707770383.579:1277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.579000 audit: BPF prog-id=176 op=LOAD Feb 12 20:39:43.583000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.583000 audit[3883]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=3477 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:43.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323237333139663033626461346666363731356533366533623131 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=3477 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:43.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323237333139663033626461346666363731356533366533623131 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit: BPF prog-id=177 op=LOAD Feb 12 20:39:43.584000 audit[3883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00025b8f0 items=0 ppid=3477 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:43.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323237333139663033626461346666363731356533366533623131 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit: BPF prog-id=178 op=LOAD Feb 12 20:39:43.584000 audit[3883]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00025b938 items=0 ppid=3477 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:43.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323237333139663033626461346666363731356533366533623131 Feb 12 20:39:43.584000 audit: BPF prog-id=178 op=UNLOAD Feb 12 20:39:43.584000 audit: BPF prog-id=177 op=UNLOAD Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { perfmon } for pid=3883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit[3883]: AVC avc: denied { bpf } for pid=3883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:43.584000 audit: BPF prog-id=179 op=LOAD Feb 12 20:39:43.584000 audit[3883]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00025bd48 items=0 ppid=3477 pid=3883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:43.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265323237333139663033626461346666363731356533366533623131 Feb 12 20:39:43.638938 env[1059]: time="2024-02-12T20:39:43.638886885Z" level=info msg="StartContainer for \"2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2\" returns successfully" Feb 12 20:39:43.738199 kubelet[1941]: I0212 20:39:43.738163 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-74958d95b4-dtbmt" podStartSLOduration=37.947751817 podCreationTimestamp="2024-02-12 20:39:01 +0000 UTC" firstStartedPulling="2024-02-12 20:39:38.672415103 +0000 UTC m=+56.786466271" lastFinishedPulling="2024-02-12 20:39:43.462770572 +0000 UTC m=+61.576821851" observedRunningTime="2024-02-12 20:39:43.737699041 +0000 UTC m=+61.851750199" watchObservedRunningTime="2024-02-12 20:39:43.738107397 +0000 UTC m=+61.852158555" Feb 12 20:39:44.969185 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1996229493.mount: Deactivated successfully. Feb 12 20:39:45.550512 env[1059]: time="2024-02-12T20:39:45.550435316Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:45.554581 env[1059]: time="2024-02-12T20:39:45.554528911Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:45.558283 env[1059]: time="2024-02-12T20:39:45.558176040Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:45.562177 env[1059]: time="2024-02-12T20:39:45.562107180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:45.563398 env[1059]: time="2024-02-12T20:39:45.563330785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:39:45.570138 env[1059]: time="2024-02-12T20:39:45.570074981Z" level=info msg="CreateContainer within sandbox \"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:39:45.597178 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2333276020.mount: Deactivated successfully. Feb 12 20:39:45.597601 env[1059]: time="2024-02-12T20:39:45.597211484Z" level=info msg="CreateContainer within sandbox \"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"43e98e7df3dce3f11eb9811d5c4049963f2a8e59bbe80d8102e8104f907ea157\"" Feb 12 20:39:45.599926 env[1059]: time="2024-02-12T20:39:45.599846443Z" level=info msg="StartContainer for \"43e98e7df3dce3f11eb9811d5c4049963f2a8e59bbe80d8102e8104f907ea157\"" Feb 12 20:39:45.660483 systemd[1]: Started cri-containerd-43e98e7df3dce3f11eb9811d5c4049963f2a8e59bbe80d8102e8104f907ea157.scope. Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4758e982f8 items=0 ppid=3621 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:45.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653938653764663364636533663131656239383131643563343034 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.681000 audit: BPF prog-id=180 op=LOAD Feb 12 20:39:45.681000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000240b8 items=0 ppid=3621 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:45.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653938653764663364636533663131656239383131643563343034 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.682000 audit: BPF prog-id=181 op=LOAD Feb 12 20:39:45.682000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024108 items=0 ppid=3621 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:45.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653938653764663364636533663131656239383131643563343034 Feb 12 20:39:45.682000 audit: BPF prog-id=181 op=UNLOAD Feb 12 20:39:45.683000 audit: BPF prog-id=180 op=UNLOAD Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:45.683000 audit: BPF prog-id=182 op=LOAD Feb 12 20:39:45.683000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024198 items=0 ppid=3621 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:45.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653938653764663364636533663131656239383131643563343034 Feb 12 20:39:45.706430 env[1059]: time="2024-02-12T20:39:45.706357728Z" level=info msg="StartContainer for \"43e98e7df3dce3f11eb9811d5c4049963f2a8e59bbe80d8102e8104f907ea157\" returns successfully" Feb 12 20:39:45.708940 env[1059]: time="2024-02-12T20:39:45.708909973Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:39:46.588286 systemd[1]: run-containerd-runc-k8s.io-43e98e7df3dce3f11eb9811d5c4049963f2a8e59bbe80d8102e8104f907ea157-runc.AqO4e5.mount: Deactivated successfully. Feb 12 20:39:48.005066 env[1059]: time="2024-02-12T20:39:48.004991375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:48.011026 env[1059]: time="2024-02-12T20:39:48.010954215Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:48.015363 env[1059]: time="2024-02-12T20:39:48.015205327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:48.020288 env[1059]: time="2024-02-12T20:39:48.020145240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:39:48.022014 env[1059]: time="2024-02-12T20:39:48.021885733Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:39:48.032941 env[1059]: time="2024-02-12T20:39:48.032845954Z" level=info msg="CreateContainer within sandbox \"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:39:48.109784 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2560224776.mount: Deactivated successfully. Feb 12 20:39:48.111842 env[1059]: time="2024-02-12T20:39:48.111749355Z" level=info msg="CreateContainer within sandbox \"af0901d4322cdc2d5b165e85acb0bfc4da0a34bd9421d518d61128f8f94dbc03\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"49ad99e14ae4e511673d518c904a3cd4ee9d236c009eee43edfe166c4551d775\"" Feb 12 20:39:48.115905 env[1059]: time="2024-02-12T20:39:48.115858490Z" level=info msg="StartContainer for \"49ad99e14ae4e511673d518c904a3cd4ee9d236c009eee43edfe166c4551d775\"" Feb 12 20:39:48.149930 systemd[1]: Started cri-containerd-49ad99e14ae4e511673d518c904a3cd4ee9d236c009eee43edfe166c4551d775.scope. Feb 12 20:39:48.170000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.170000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9d69ab9cb8 items=0 ppid=3621 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:48.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616439396531346165346535313136373364353138633930346133 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.171000 audit: BPF prog-id=183 op=LOAD Feb 12 20:39:48.171000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000322be8 items=0 ppid=3621 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:48.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616439396531346165346535313136373364353138633930346133 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.173000 audit: BPF prog-id=184 op=LOAD Feb 12 20:39:48.173000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000322c38 items=0 ppid=3621 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:48.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616439396531346165346535313136373364353138633930346133 Feb 12 20:39:48.173000 audit: BPF prog-id=184 op=UNLOAD Feb 12 20:39:48.174000 audit: BPF prog-id=183 op=UNLOAD Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { perfmon } for pid=3985 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit[3985]: AVC avc: denied { bpf } for pid=3985 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:39:48.174000 audit: BPF prog-id=185 op=LOAD Feb 12 20:39:48.174000 audit[3985]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000322cc8 items=0 ppid=3621 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:48.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439616439396531346165346535313136373364353138633930346133 Feb 12 20:39:48.199417 env[1059]: time="2024-02-12T20:39:48.198992062Z" level=info msg="StartContainer for \"49ad99e14ae4e511673d518c904a3cd4ee9d236c009eee43edfe166c4551d775\" returns successfully" Feb 12 20:39:48.234352 kubelet[1941]: I0212 20:39:48.234300 1941 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:39:48.235077 kubelet[1941]: I0212 20:39:48.235057 1941 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:39:48.796298 kubelet[1941]: I0212 20:39:48.796213 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-sbdjq" podStartSLOduration=39.289622666 podCreationTimestamp="2024-02-12 20:39:01 +0000 UTC" firstStartedPulling="2024-02-12 20:39:39.516209582 +0000 UTC m=+57.630260741" lastFinishedPulling="2024-02-12 20:39:48.022699398 +0000 UTC m=+66.136750607" observedRunningTime="2024-02-12 20:39:48.784151564 +0000 UTC m=+66.898202823" watchObservedRunningTime="2024-02-12 20:39:48.796112532 +0000 UTC m=+66.910163740" Feb 12 20:39:51.262000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.263578 kernel: kauditd_printk_skb: 133 callbacks suppressed Feb 12 20:39:51.263781 kernel: audit: type=1400 audit(1707770391.262:1298): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.262000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001583aa0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.291950 kernel: audit: type=1300 audit(1707770391.262:1298): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001583aa0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.262000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.301268 kernel: audit: type=1327 audit(1707770391.262:1298): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.301439 kernel: audit: type=1400 audit(1707770391.266:1299): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.266000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.266000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001583bc0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.312067 kernel: audit: type=1300 audit(1707770391.266:1299): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001583bc0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.312256 kernel: audit: type=1327 audit(1707770391.266:1299): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.317092 kernel: audit: type=1400 audit(1707770391.277:1300): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.277000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.277000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001085ba0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.327488 kernel: audit: type=1300 audit(1707770391.277:1300): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001085ba0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.327553 kernel: audit: type=1327 audit(1707770391.277:1300): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.277000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.271000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.336858 kernel: audit: type=1400 audit(1707770391.271:1301): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:39:51.271000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001583ce0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:39:51.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:39:51.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.200:22-172.24.4.1:36686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:39:51.704799 systemd[1]: Started sshd@7-172.24.4.200:22-172.24.4.1:36686.service. Feb 12 20:39:52.793000 audit[4022]: USER_ACCT pid=4022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:39:52.795000 audit[4022]: CRED_ACQ pid=4022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:39:52.795000 audit[4022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd1937ed0 a2=3 a3=0 items=0 ppid=1 pid=4022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:39:52.795000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:39:52.797798 sshd[4022]: Accepted publickey for core from 172.24.4.1 port 36686 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:39:52.799908 sshd[4022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:39:52.812435 systemd[1]: Started session-8.scope. Feb 12 20:39:52.814461 systemd-logind[1049]: New session 8 of user core. Feb 12 20:39:52.826000 audit[4022]: USER_START pid=4022 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:39:52.830000 audit[4045]: CRED_ACQ pid=4045 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:39:54.266354 sshd[4022]: pam_unix(sshd:session): session closed for user core Feb 12 20:39:54.269000 audit[4022]: USER_END pid=4022 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:39:54.269000 audit[4022]: CRED_DISP pid=4022 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:39:54.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.200:22-172.24.4.1:36686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:39:54.272176 systemd[1]: sshd@7-172.24.4.200:22-172.24.4.1:36686.service: Deactivated successfully. Feb 12 20:39:54.275008 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 20:39:54.276199 systemd-logind[1049]: Session 8 logged out. Waiting for processes to exit. Feb 12 20:39:54.279099 systemd-logind[1049]: Removed session 8. Feb 12 20:39:59.285104 systemd[1]: Started sshd@8-172.24.4.200:22-172.24.4.1:38620.service. Feb 12 20:39:59.294925 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 20:39:59.295151 kernel: audit: type=1130 audit(1707770399.288:1311): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.200:22-172.24.4.1:38620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:39:59.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.200:22-172.24.4.1:38620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:39:59.467882 systemd[1]: run-containerd-runc-k8s.io-6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe-runc.qsGBHs.mount: Deactivated successfully. Feb 12 20:40:00.437000 audit[4065]: USER_ACCT pid=4065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.439024 sshd[4065]: Accepted publickey for core from 172.24.4.1 port 38620 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:00.448000 audit[4065]: CRED_ACQ pid=4065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.459109 kernel: audit: type=1101 audit(1707770400.437:1312): pid=4065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.459383 kernel: audit: type=1103 audit(1707770400.448:1313): pid=4065 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.460813 sshd[4065]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:00.468136 kernel: audit: type=1006 audit(1707770400.449:1314): pid=4065 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 20:40:00.468414 kernel: audit: type=1300 audit(1707770400.449:1314): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd778f72f0 a2=3 a3=0 items=0 ppid=1 pid=4065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:00.449000 audit[4065]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd778f72f0 a2=3 a3=0 items=0 ppid=1 pid=4065 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:00.479421 kernel: audit: type=1327 audit(1707770400.449:1314): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:00.449000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:00.490098 systemd-logind[1049]: New session 9 of user core. Feb 12 20:40:00.491106 systemd[1]: Started session-9.scope. Feb 12 20:40:00.506000 audit[4065]: USER_START pid=4065 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.521609 kernel: audit: type=1105 audit(1707770400.506:1315): pid=4065 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.521796 kernel: audit: type=1103 audit(1707770400.509:1316): pid=4090 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:00.509000 audit[4090]: CRED_ACQ pid=4090 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:01.270570 sshd[4065]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:01.273000 audit[4065]: USER_END pid=4065 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:01.293295 kernel: audit: type=1106 audit(1707770401.273:1317): pid=4065 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:01.273000 audit[4065]: CRED_DISP pid=4065 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:01.304684 kernel: audit: type=1104 audit(1707770401.273:1318): pid=4065 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:01.305713 systemd[1]: sshd@8-172.24.4.200:22-172.24.4.1:38620.service: Deactivated successfully. Feb 12 20:40:01.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.200:22-172.24.4.1:38620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:01.308362 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 20:40:01.311501 systemd-logind[1049]: Session 9 logged out. Waiting for processes to exit. Feb 12 20:40:01.315460 systemd-logind[1049]: Removed session 9. Feb 12 20:40:06.276316 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:40:06.276433 kernel: audit: type=1130 audit(1707770406.274:1320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.200:22-172.24.4.1:44784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:06.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.200:22-172.24.4.1:44784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:06.274945 systemd[1]: Started sshd@9-172.24.4.200:22-172.24.4.1:44784.service. Feb 12 20:40:07.726000 audit[4103]: USER_ACCT pid=4103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.727311 sshd[4103]: Accepted publickey for core from 172.24.4.1 port 44784 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:07.738277 kernel: audit: type=1101 audit(1707770407.726:1321): pid=4103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.742000 audit[4103]: CRED_ACQ pid=4103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.745509 sshd[4103]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:07.753298 kernel: audit: type=1103 audit(1707770407.742:1322): pid=4103 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.742000 audit[4103]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff881f830 a2=3 a3=0 items=0 ppid=1 pid=4103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:07.771942 kernel: audit: type=1006 audit(1707770407.742:1323): pid=4103 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 20:40:07.772076 kernel: audit: type=1300 audit(1707770407.742:1323): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff881f830 a2=3 a3=0 items=0 ppid=1 pid=4103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:07.742000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:07.777397 kernel: audit: type=1327 audit(1707770407.742:1323): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:07.783527 systemd-logind[1049]: New session 10 of user core. Feb 12 20:40:07.784845 systemd[1]: Started session-10.scope. Feb 12 20:40:07.799000 audit[4103]: USER_START pid=4103 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.812343 kernel: audit: type=1105 audit(1707770407.799:1324): pid=4103 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.812000 audit[4105]: CRED_ACQ pid=4105 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:07.823287 kernel: audit: type=1103 audit(1707770407.812:1325): pid=4105 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:08.706310 sshd[4103]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:08.708000 audit[4103]: USER_END pid=4103 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:08.711534 systemd[1]: sshd@9-172.24.4.200:22-172.24.4.1:44784.service: Deactivated successfully. Feb 12 20:40:08.713087 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 20:40:08.722266 kernel: audit: type=1106 audit(1707770408.708:1326): pid=4103 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:08.723472 systemd-logind[1049]: Session 10 logged out. Waiting for processes to exit. Feb 12 20:40:08.708000 audit[4103]: CRED_DISP pid=4103 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:08.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.200:22-172.24.4.1:44784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:08.735322 kernel: audit: type=1104 audit(1707770408.708:1327): pid=4103 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:08.735031 systemd-logind[1049]: Removed session 10. Feb 12 20:40:13.715895 systemd[1]: Started sshd@10-172.24.4.200:22-172.24.4.1:44790.service. Feb 12 20:40:13.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.200:22-172.24.4.1:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:13.719563 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:40:13.719711 kernel: audit: type=1130 audit(1707770413.716:1329): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.200:22-172.24.4.1:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:14.755000 audit[4116]: USER_ACCT pid=4116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.758345 sshd[4116]: Accepted publickey for core from 172.24.4.1 port 44790 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:14.767312 kernel: audit: type=1101 audit(1707770414.755:1330): pid=4116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.768000 audit[4116]: CRED_ACQ pid=4116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.769830 sshd[4116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:14.780296 kernel: audit: type=1103 audit(1707770414.768:1331): pid=4116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.788304 kernel: audit: type=1006 audit(1707770414.768:1332): pid=4116 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 20:40:14.788464 kernel: audit: type=1300 audit(1707770414.768:1332): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbb057c70 a2=3 a3=0 items=0 ppid=1 pid=4116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:14.768000 audit[4116]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffbb057c70 a2=3 a3=0 items=0 ppid=1 pid=4116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:14.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:14.814333 kernel: audit: type=1327 audit(1707770414.768:1332): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:14.819630 systemd-logind[1049]: New session 11 of user core. Feb 12 20:40:14.822105 systemd[1]: Started session-11.scope. Feb 12 20:40:14.834000 audit[4116]: USER_START pid=4116 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.838000 audit[4118]: CRED_ACQ pid=4118 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.858118 kernel: audit: type=1105 audit(1707770414.834:1333): pid=4116 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:14.858606 kernel: audit: type=1103 audit(1707770414.838:1334): pid=4118 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:15.524955 sshd[4116]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:15.530000 audit[4116]: USER_END pid=4116 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:15.536277 systemd[1]: sshd@10-172.24.4.200:22-172.24.4.1:44790.service: Deactivated successfully. Feb 12 20:40:15.538310 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 20:40:15.530000 audit[4116]: CRED_DISP pid=4116 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:15.542557 systemd-logind[1049]: Session 11 logged out. Waiting for processes to exit. Feb 12 20:40:15.551767 kernel: audit: type=1106 audit(1707770415.530:1335): pid=4116 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:15.551860 kernel: audit: type=1104 audit(1707770415.530:1336): pid=4116 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:15.553319 systemd[1]: Started sshd@11-172.24.4.200:22-172.24.4.1:45024.service. Feb 12 20:40:15.556076 systemd-logind[1049]: Removed session 11. Feb 12 20:40:15.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.200:22-172.24.4.1:44790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:15.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.200:22-172.24.4.1:45024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:16.764000 audit[4130]: USER_ACCT pid=4130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:16.765256 sshd[4130]: Accepted publickey for core from 172.24.4.1 port 45024 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:16.767000 audit[4130]: CRED_ACQ pid=4130 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:16.767000 audit[4130]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e675b30 a2=3 a3=0 items=0 ppid=1 pid=4130 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:16.767000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:16.768559 sshd[4130]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:16.780327 systemd[1]: Started session-12.scope. Feb 12 20:40:16.781735 systemd-logind[1049]: New session 12 of user core. Feb 12 20:40:16.792000 audit[4130]: USER_START pid=4130 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:16.795000 audit[4139]: CRED_ACQ pid=4139 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:18.652382 sshd[4130]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:18.655728 systemd[1]: Started sshd@12-172.24.4.200:22-172.24.4.1:45040.service. Feb 12 20:40:18.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.200:22-172.24.4.1:45040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:18.660000 audit[4130]: USER_END pid=4130 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:18.661000 audit[4130]: CRED_DISP pid=4130 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:18.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.200:22-172.24.4.1:45024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:18.670988 systemd[1]: sshd@11-172.24.4.200:22-172.24.4.1:45024.service: Deactivated successfully. Feb 12 20:40:18.676314 systemd-logind[1049]: Session 12 logged out. Waiting for processes to exit. Feb 12 20:40:18.676366 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 20:40:18.683302 systemd-logind[1049]: Removed session 12. Feb 12 20:40:20.845165 sshd[4146]: Accepted publickey for core from 172.24.4.1 port 45040 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:20.844000 audit[4146]: USER_ACCT pid=4146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.848604 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 20:40:20.848796 kernel: audit: type=1101 audit(1707770420.844:1348): pid=4146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.849000 audit[4146]: CRED_ACQ pid=4146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.870863 sshd[4146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:20.874407 kernel: audit: type=1103 audit(1707770420.849:1349): pid=4146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.882284 kernel: audit: type=1006 audit(1707770420.849:1350): pid=4146 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 20:40:20.882471 kernel: audit: type=1300 audit(1707770420.849:1350): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca2cce300 a2=3 a3=0 items=0 ppid=1 pid=4146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:20.849000 audit[4146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca2cce300 a2=3 a3=0 items=0 ppid=1 pid=4146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:20.849000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:20.900276 kernel: audit: type=1327 audit(1707770420.849:1350): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:20.906704 systemd-logind[1049]: New session 13 of user core. Feb 12 20:40:20.907703 systemd[1]: Started session-13.scope. Feb 12 20:40:20.922000 audit[4146]: USER_START pid=4146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.922000 audit[4151]: CRED_ACQ pid=4151 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.934054 kernel: audit: type=1105 audit(1707770420.922:1351): pid=4146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:20.934181 kernel: audit: type=1103 audit(1707770420.922:1352): pid=4151 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:21.618161 sshd[4146]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:21.620000 audit[4146]: USER_END pid=4146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:21.624025 systemd[1]: sshd@12-172.24.4.200:22-172.24.4.1:45040.service: Deactivated successfully. Feb 12 20:40:21.625642 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 20:40:21.633290 kernel: audit: type=1106 audit(1707770421.620:1353): pid=4146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:21.635025 systemd-logind[1049]: Session 13 logged out. Waiting for processes to exit. Feb 12 20:40:21.620000 audit[4146]: CRED_DISP pid=4146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:21.647078 systemd-logind[1049]: Removed session 13. Feb 12 20:40:21.647527 kernel: audit: type=1104 audit(1707770421.620:1354): pid=4146 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:21.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.200:22-172.24.4.1:45040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:21.658323 kernel: audit: type=1131 audit(1707770421.624:1355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.200:22-172.24.4.1:45040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:26.626056 systemd[1]: Started sshd@13-172.24.4.200:22-172.24.4.1:32854.service. Feb 12 20:40:26.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.200:22-172.24.4.1:32854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:26.637344 kernel: audit: type=1130 audit(1707770426.626:1356): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.200:22-172.24.4.1:32854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:28.106000 audit[4207]: USER_ACCT pid=4207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.107219 sshd[4207]: Accepted publickey for core from 172.24.4.1 port 32854 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:28.117000 audit[4207]: CRED_ACQ pid=4207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.118899 sshd[4207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:28.127991 kernel: audit: type=1101 audit(1707770428.106:1357): pid=4207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.128144 kernel: audit: type=1103 audit(1707770428.117:1358): pid=4207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.135273 kernel: audit: type=1006 audit(1707770428.117:1359): pid=4207 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Feb 12 20:40:28.117000 audit[4207]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea73fd8b0 a2=3 a3=0 items=0 ppid=1 pid=4207 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:28.149113 kernel: audit: type=1300 audit(1707770428.117:1359): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea73fd8b0 a2=3 a3=0 items=0 ppid=1 pid=4207 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:28.117000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:28.156835 kernel: audit: type=1327 audit(1707770428.117:1359): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:28.157427 systemd-logind[1049]: New session 14 of user core. Feb 12 20:40:28.158603 systemd[1]: Started session-14.scope. Feb 12 20:40:28.174000 audit[4207]: USER_START pid=4207 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.175000 audit[4209]: CRED_ACQ pid=4209 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.197521 kernel: audit: type=1105 audit(1707770428.174:1360): pid=4207 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.197645 kernel: audit: type=1103 audit(1707770428.175:1361): pid=4209 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.953672 sshd[4207]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:28.955000 audit[4207]: USER_END pid=4207 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.969318 kernel: audit: type=1106 audit(1707770428.955:1362): pid=4207 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.969296 systemd[1]: sshd@13-172.24.4.200:22-172.24.4.1:32854.service: Deactivated successfully. Feb 12 20:40:28.955000 audit[4207]: CRED_DISP pid=4207 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.971058 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 20:40:28.981303 kernel: audit: type=1104 audit(1707770428.955:1363): pid=4207 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:28.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.200:22-172.24.4.1:32854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:28.982147 systemd-logind[1049]: Session 14 logged out. Waiting for processes to exit. Feb 12 20:40:28.984504 systemd-logind[1049]: Removed session 14. Feb 12 20:40:29.453161 systemd[1]: run-containerd-runc-k8s.io-6dbfa81bef0019706ab21a9e598f422aa1abde7dc03d25bc0ae6eb7cd88b90fe-runc.yPodeO.mount: Deactivated successfully. Feb 12 20:40:33.963442 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:40:33.963655 kernel: audit: type=1130 audit(1707770433.961:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.200:22-172.24.4.1:32864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:33.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.200:22-172.24.4.1:32864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:33.961794 systemd[1]: Started sshd@14-172.24.4.200:22-172.24.4.1:32864.service. Feb 12 20:40:35.235109 sshd[4242]: Accepted publickey for core from 172.24.4.1 port 32864 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:35.236513 sshd[4242]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:35.234000 audit[4242]: USER_ACCT pid=4242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.241913 kernel: audit: type=1101 audit(1707770435.234:1366): pid=4242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.235000 audit[4242]: CRED_ACQ pid=4242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.247249 kernel: audit: type=1103 audit(1707770435.235:1367): pid=4242 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.251318 kernel: audit: type=1006 audit(1707770435.235:1368): pid=4242 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 20:40:35.251402 kernel: audit: type=1300 audit(1707770435.235:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8c229100 a2=3 a3=0 items=0 ppid=1 pid=4242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:35.235000 audit[4242]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8c229100 a2=3 a3=0 items=0 ppid=1 pid=4242 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:35.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:35.260900 kernel: audit: type=1327 audit(1707770435.235:1368): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:35.260531 systemd-logind[1049]: New session 15 of user core. Feb 12 20:40:35.261213 systemd[1]: Started session-15.scope. Feb 12 20:40:35.267000 audit[4242]: USER_START pid=4242 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.274371 kernel: audit: type=1105 audit(1707770435.267:1369): pid=4242 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.273000 audit[4244]: CRED_ACQ pid=4244 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.279252 kernel: audit: type=1103 audit(1707770435.273:1370): pid=4244 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:35.969929 kubelet[1941]: I0212 20:40:35.969840 1941 topology_manager.go:212] "Topology Admit Handler" Feb 12 20:40:35.979436 systemd[1]: Created slice kubepods-besteffort-podf18b866d_2569_4c94_9abd_1d0e2b0429ba.slice. Feb 12 20:40:35.984000 audit[4252]: NETFILTER_CFG table=filter:112 family=2 entries=9 op=nft_register_rule pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:35.988271 kernel: audit: type=1325 audit(1707770435.984:1371): table=filter:112 family=2 entries=9 op=nft_register_rule pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:35.984000 audit[4252]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe79196a70 a2=0 a3=7ffe79196a5c items=0 ppid=2077 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:35.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:36.004261 kernel: audit: type=1300 audit(1707770435.984:1371): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe79196a70 a2=0 a3=7ffe79196a5c items=0 ppid=2077 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:36.008000 audit[4252]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:36.008000 audit[4252]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe79196a70 a2=0 a3=7ffe79196a5c items=0 ppid=2077 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:36.008000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:36.026000 audit[4254]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:36.026000 audit[4254]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd857b5ff0 a2=0 a3=7ffd857b5fdc items=0 ppid=2077 pid=4254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:36.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:36.027000 audit[4254]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4254 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:36.027000 audit[4254]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd857b5ff0 a2=0 a3=7ffd857b5fdc items=0 ppid=2077 pid=4254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:36.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:36.047421 kubelet[1941]: I0212 20:40:36.047389 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-br2v9\" (UniqueName: \"kubernetes.io/projected/f18b866d-2569-4c94-9abd-1d0e2b0429ba-kube-api-access-br2v9\") pod \"calico-apiserver-6d86d9485d-qr7cz\" (UID: \"f18b866d-2569-4c94-9abd-1d0e2b0429ba\") " pod="calico-apiserver/calico-apiserver-6d86d9485d-qr7cz" Feb 12 20:40:36.047572 kubelet[1941]: I0212 20:40:36.047467 1941 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f18b866d-2569-4c94-9abd-1d0e2b0429ba-calico-apiserver-certs\") pod \"calico-apiserver-6d86d9485d-qr7cz\" (UID: \"f18b866d-2569-4c94-9abd-1d0e2b0429ba\") " pod="calico-apiserver/calico-apiserver-6d86d9485d-qr7cz" Feb 12 20:40:36.069945 sshd[4242]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:36.071000 audit[4242]: USER_END pid=4242 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:36.071000 audit[4242]: CRED_DISP pid=4242 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:36.073113 systemd[1]: sshd@14-172.24.4.200:22-172.24.4.1:32864.service: Deactivated successfully. Feb 12 20:40:36.073926 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 20:40:36.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.200:22-172.24.4.1:32864 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:36.074914 systemd-logind[1049]: Session 15 logged out. Waiting for processes to exit. Feb 12 20:40:36.075786 systemd-logind[1049]: Removed session 15. Feb 12 20:40:36.149478 kubelet[1941]: E0212 20:40:36.148730 1941 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 20:40:36.151567 kubelet[1941]: E0212 20:40:36.151541 1941 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f18b866d-2569-4c94-9abd-1d0e2b0429ba-calico-apiserver-certs podName:f18b866d-2569-4c94-9abd-1d0e2b0429ba nodeName:}" failed. No retries permitted until 2024-02-12 20:40:36.650041092 +0000 UTC m=+114.764092250 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f18b866d-2569-4c94-9abd-1d0e2b0429ba-calico-apiserver-certs") pod "calico-apiserver-6d86d9485d-qr7cz" (UID: "f18b866d-2569-4c94-9abd-1d0e2b0429ba") : secret "calico-apiserver-certs" not found Feb 12 20:40:36.233000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:36.233000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00272ef40 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:40:36.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:40:36.233000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:36.233000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002964c00 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:40:36.233000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:40:36.884425 env[1059]: time="2024-02-12T20:40:36.884266664Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d86d9485d-qr7cz,Uid:f18b866d-2569-4c94-9abd-1d0e2b0429ba,Namespace:calico-apiserver,Attempt:0,}" Feb 12 20:40:37.406014 systemd-networkd[975]: cali06477a612f4: Link UP Feb 12 20:40:37.410579 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:40:37.410657 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali06477a612f4: link becomes ready Feb 12 20:40:37.410003 systemd-networkd[975]: cali06477a612f4: Gained carrier Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.301 [INFO][4259] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0 calico-apiserver-6d86d9485d- calico-apiserver f18b866d-2569-4c94-9abd-1d0e2b0429ba 1088 0 2024-02-12 20:40:35 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d86d9485d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-2-6-02325721ca.novalocal calico-apiserver-6d86d9485d-qr7cz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali06477a612f4 [] []}} ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.302 [INFO][4259] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.350 [INFO][4271] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" HandleID="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.365 [INFO][4271] ipam_plugin.go 268: Auto assigning IP ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" HandleID="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ca80), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-2-6-02325721ca.novalocal", "pod":"calico-apiserver-6d86d9485d-qr7cz", "timestamp":"2024-02-12 20:40:37.350677013 +0000 UTC"}, Hostname:"ci-3510-3-2-6-02325721ca.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.365 [INFO][4271] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.365 [INFO][4271] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.365 [INFO][4271] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-2-6-02325721ca.novalocal' Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.368 [INFO][4271] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.373 [INFO][4271] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.379 [INFO][4271] ipam.go 489: Trying affinity for 192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.381 [INFO][4271] ipam.go 155: Attempting to load block cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.384 [INFO][4271] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.40.0/26 host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.384 [INFO][4271] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.40.0/26 handle="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.386 [INFO][4271] ipam.go 1682: Creating new handle: k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.392 [INFO][4271] ipam.go 1203: Writing block in order to claim IPs block=192.168.40.0/26 handle="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.399 [INFO][4271] ipam.go 1216: Successfully claimed IPs: [192.168.40.5/26] block=192.168.40.0/26 handle="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.399 [INFO][4271] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.40.5/26] handle="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" host="ci-3510-3-2-6-02325721ca.novalocal" Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.399 [INFO][4271] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:40:37.426986 env[1059]: 2024-02-12 20:40:37.399 [INFO][4271] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.40.5/26] IPv6=[] ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" HandleID="k8s-pod-network.e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Workload="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.427711 env[1059]: 2024-02-12 20:40:37.402 [INFO][4259] k8s.go 385: Populated endpoint ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0", GenerateName:"calico-apiserver-6d86d9485d-", Namespace:"calico-apiserver", SelfLink:"", UID:"f18b866d-2569-4c94-9abd-1d0e2b0429ba", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d86d9485d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"", Pod:"calico-apiserver-6d86d9485d-qr7cz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.40.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06477a612f4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:40:37.427711 env[1059]: 2024-02-12 20:40:37.402 [INFO][4259] k8s.go 386: Calico CNI using IPs: [192.168.40.5/32] ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.427711 env[1059]: 2024-02-12 20:40:37.403 [INFO][4259] dataplane_linux.go 68: Setting the host side veth name to cali06477a612f4 ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.427711 env[1059]: 2024-02-12 20:40:37.410 [INFO][4259] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.427711 env[1059]: 2024-02-12 20:40:37.411 [INFO][4259] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0", GenerateName:"calico-apiserver-6d86d9485d-", Namespace:"calico-apiserver", SelfLink:"", UID:"f18b866d-2569-4c94-9abd-1d0e2b0429ba", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d86d9485d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-2-6-02325721ca.novalocal", ContainerID:"e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c", Pod:"calico-apiserver-6d86d9485d-qr7cz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.40.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali06477a612f4", MAC:"5e:ad:c5:6c:dd:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:40:37.427711 env[1059]: 2024-02-12 20:40:37.425 [INFO][4259] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c" Namespace="calico-apiserver" Pod="calico-apiserver-6d86d9485d-qr7cz" WorkloadEndpoint="ci--3510--3--2--6--02325721ca.novalocal-k8s-calico--apiserver--6d86d9485d--qr7cz-eth0" Feb 12 20:40:37.462000 audit[4295]: NETFILTER_CFG table=filter:116 family=2 entries=55 op=nft_register_chain pid=4295 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:40:37.462000 audit[4295]: SYSCALL arch=c000003e syscall=46 success=yes exit=28088 a0=3 a1=7fffabeddeb0 a2=0 a3=7fffabedde9c items=0 ppid=2991 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:37.462000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:40:37.479372 env[1059]: time="2024-02-12T20:40:37.479297820Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:40:37.479516 env[1059]: time="2024-02-12T20:40:37.479358504Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:40:37.479516 env[1059]: time="2024-02-12T20:40:37.479373873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:40:37.479731 env[1059]: time="2024-02-12T20:40:37.479687260Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c pid=4305 runtime=io.containerd.runc.v2 Feb 12 20:40:37.497250 systemd[1]: Started cri-containerd-e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c.scope. Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.523000 audit: BPF prog-id=186 op=LOAD Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:37.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613939326632626261636138313762343639363463633430653361 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:37.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613939326632626261636138313762343639363463633430653361 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit: BPF prog-id=187 op=LOAD Feb 12 20:40:37.526000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00026ffa0 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:37.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613939326632626261636138313762343639363463633430653361 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.526000 audit: BPF prog-id=188 op=LOAD Feb 12 20:40:37.526000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00026ffe8 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:37.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613939326632626261636138313762343639363463633430653361 Feb 12 20:40:37.527000 audit: BPF prog-id=188 op=UNLOAD Feb 12 20:40:37.527000 audit: BPF prog-id=187 op=UNLOAD Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:37.527000 audit: BPF prog-id=189 op=LOAD Feb 12 20:40:37.527000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003f03f8 items=0 ppid=4305 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:37.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533613939326632626261636138313762343639363463633430653361 Feb 12 20:40:37.572981 env[1059]: time="2024-02-12T20:40:37.572931996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d86d9485d-qr7cz,Uid:f18b866d-2569-4c94-9abd-1d0e2b0429ba,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c\"" Feb 12 20:40:37.575030 env[1059]: time="2024-02-12T20:40:37.575001598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 20:40:38.193000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:38.193000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c011c3ca80 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:40:38.193000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:40:38.195000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:38.195000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c011c3cbd0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:40:38.195000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:40:38.197000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:38.197000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00e2b61a0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:40:38.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:40:38.217000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:38.217000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c011c3d200 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:40:38.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:40:38.270000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:38.270000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:38.270000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0144a64e0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:40:38.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:40:38.270000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00e2b68e0 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:40:38.270000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:40:38.549470 systemd-networkd[975]: cali06477a612f4: Gained IPv6LL Feb 12 20:40:41.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.200:22-172.24.4.1:59598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:41.074293 systemd[1]: Started sshd@15-172.24.4.200:22-172.24.4.1:59598.service. Feb 12 20:40:41.076731 kernel: kauditd_printk_skb: 97 callbacks suppressed Feb 12 20:40:41.076793 kernel: audit: type=1130 audit(1707770441.074:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.200:22-172.24.4.1:59598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:42.579525 kernel: audit: type=1101 audit(1707770442.574:1406): pid=4339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.579637 kernel: audit: type=1103 audit(1707770442.579:1407): pid=4339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.574000 audit[4339]: USER_ACCT pid=4339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.579000 audit[4339]: CRED_ACQ pid=4339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.580354 sshd[4339]: Accepted publickey for core from 172.24.4.1 port 59598 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:42.581739 sshd[4339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:42.589906 kernel: audit: type=1006 audit(1707770442.579:1408): pid=4339 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 20:40:42.590011 kernel: audit: type=1300 audit(1707770442.579:1408): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe03c9bdc0 a2=3 a3=0 items=0 ppid=1 pid=4339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:42.579000 audit[4339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe03c9bdc0 a2=3 a3=0 items=0 ppid=1 pid=4339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:42.589337 systemd[1]: Started session-16.scope. Feb 12 20:40:42.591595 systemd-logind[1049]: New session 16 of user core. Feb 12 20:40:42.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:42.599276 kernel: audit: type=1327 audit(1707770442.579:1408): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:42.599000 audit[4339]: USER_START pid=4339 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.612304 kernel: audit: type=1105 audit(1707770442.599:1409): pid=4339 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.619863 kernel: audit: type=1103 audit(1707770442.611:1410): pid=4345 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:42.611000 audit[4345]: CRED_ACQ pid=4345 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:43.447284 env[1059]: time="2024-02-12T20:40:43.447178697Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:40:43.449761 env[1059]: time="2024-02-12T20:40:43.449726796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:40:43.452421 env[1059]: time="2024-02-12T20:40:43.452390961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:40:43.456686 env[1059]: time="2024-02-12T20:40:43.456578235Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:40:43.456993 env[1059]: time="2024-02-12T20:40:43.456950012Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 20:40:43.460981 env[1059]: time="2024-02-12T20:40:43.460937489Z" level=info msg="CreateContainer within sandbox \"e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 20:40:43.490718 env[1059]: time="2024-02-12T20:40:43.490677792Z" level=info msg="CreateContainer within sandbox \"e3a992f2bbaca817b46964cc40e3aa552b07250f24b61d3c91eb50c1abf35d3c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"68110bd37ebe7f55275f1837008240c7961196134a7767b2865590dd90e82df2\"" Feb 12 20:40:43.492269 env[1059]: time="2024-02-12T20:40:43.492233580Z" level=info msg="StartContainer for \"68110bd37ebe7f55275f1837008240c7961196134a7767b2865590dd90e82df2\"" Feb 12 20:40:43.517174 systemd[1]: Started cri-containerd-68110bd37ebe7f55275f1837008240c7961196134a7767b2865590dd90e82df2.scope. Feb 12 20:40:43.525366 systemd[1]: run-containerd-runc-k8s.io-68110bd37ebe7f55275f1837008240c7961196134a7767b2865590dd90e82df2-runc.PVsijP.mount: Deactivated successfully. Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.554660 kernel: audit: type=1400 audit(1707770443.547:1411): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.554710 kernel: audit: type=1400 audit(1707770443.547:1412): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.554000 audit: BPF prog-id=190 op=LOAD Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4305 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313130626433376562653766353532373566313833373030383234 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4305 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313130626433376562653766353532373566313833373030383234 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit: BPF prog-id=191 op=LOAD Feb 12 20:40:43.555000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00035bdf0 items=0 ppid=4305 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313130626433376562653766353532373566313833373030383234 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.555000 audit: BPF prog-id=192 op=LOAD Feb 12 20:40:43.555000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00035be38 items=0 ppid=4305 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313130626433376562653766353532373566313833373030383234 Feb 12 20:40:43.555000 audit: BPF prog-id=192 op=UNLOAD Feb 12 20:40:43.556000 audit: BPF prog-id=191 op=UNLOAD Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:40:43.556000 audit: BPF prog-id=193 op=LOAD Feb 12 20:40:43.556000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c4248 items=0 ppid=4305 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313130626433376562653766353532373566313833373030383234 Feb 12 20:40:43.590394 env[1059]: time="2024-02-12T20:40:43.590354542Z" level=info msg="StartContainer for \"68110bd37ebe7f55275f1837008240c7961196134a7767b2865590dd90e82df2\" returns successfully" Feb 12 20:40:43.686014 sshd[4339]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:43.688000 audit[4339]: USER_END pid=4339 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:43.688000 audit[4339]: CRED_DISP pid=4339 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:43.697378 systemd[1]: sshd@15-172.24.4.200:22-172.24.4.1:59598.service: Deactivated successfully. Feb 12 20:40:43.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.200:22-172.24.4.1:59598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:43.705436 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 20:40:43.713906 systemd-logind[1049]: Session 16 logged out. Waiting for processes to exit. Feb 12 20:40:43.724640 systemd[1]: Started sshd@16-172.24.4.200:22-172.24.4.1:59608.service. Feb 12 20:40:43.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.200:22-172.24.4.1:59608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:43.729573 systemd-logind[1049]: Removed session 16. Feb 12 20:40:43.965000 audit[4397]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:43.965000 audit[4397]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdae39d850 a2=0 a3=7ffdae39d83c items=0 ppid=2077 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:43.973000 audit[4397]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:43.973000 audit[4397]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdae39d850 a2=0 a3=7ffdae39d83c items=0 ppid=2077 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:43.973000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:43.989742 kubelet[1941]: I0212 20:40:43.989705 1941 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d86d9485d-qr7cz" podStartSLOduration=3.104485496 podCreationTimestamp="2024-02-12 20:40:35 +0000 UTC" firstStartedPulling="2024-02-12 20:40:37.574653845 +0000 UTC m=+115.688705003" lastFinishedPulling="2024-02-12 20:40:43.457737548 +0000 UTC m=+121.571788716" observedRunningTime="2024-02-12 20:40:43.986463876 +0000 UTC m=+122.100515064" watchObservedRunningTime="2024-02-12 20:40:43.987569209 +0000 UTC m=+122.101620377" Feb 12 20:40:44.018000 audit[4399]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:44.018000 audit[4399]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd22618060 a2=0 a3=7ffd2261804c items=0 ppid=2077 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:44.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:44.020000 audit[4399]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:44.020000 audit[4399]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd22618060 a2=0 a3=7ffd2261804c items=0 ppid=2077 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:44.020000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:44.045000 audit[4372]: AVC avc: denied { watch } for pid=4372 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_20_40_36.3307051685/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c600,c635 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c600,c635 tclass=file permissive=0 Feb 12 20:40:44.045000 audit[4372]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009ccf80 a2=fc6 a3=0 items=0 ppid=4305 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c600,c635 key=(null) Feb 12 20:40:44.045000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 20:40:45.087000 audit[4394]: USER_ACCT pid=4394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:45.088769 sshd[4394]: Accepted publickey for core from 172.24.4.1 port 59608 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:45.092000 audit[4394]: CRED_ACQ pid=4394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:45.092000 audit[4394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6d5c0450 a2=3 a3=0 items=0 ppid=1 pid=4394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:45.092000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:45.094491 sshd[4394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:45.106070 systemd-logind[1049]: New session 17 of user core. Feb 12 20:40:45.106992 systemd[1]: Started session-17.scope. Feb 12 20:40:45.121000 audit[4394]: USER_START pid=4394 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:45.124000 audit[4400]: CRED_ACQ pid=4400 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:46.560479 sshd[4394]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:46.579761 kernel: kauditd_printk_skb: 81 callbacks suppressed Feb 12 20:40:46.580004 kernel: audit: type=1106 audit(1707770446.564:1443): pid=4394 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:46.564000 audit[4394]: USER_END pid=4394 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:46.582875 systemd[1]: Started sshd@17-172.24.4.200:22-172.24.4.1:33792.service. Feb 12 20:40:46.579000 audit[4394]: CRED_DISP pid=4394 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:46.595374 kernel: audit: type=1104 audit(1707770446.579:1444): pid=4394 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:46.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.200:22-172.24.4.1:33792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:46.607353 kernel: audit: type=1130 audit(1707770446.584:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.200:22-172.24.4.1:33792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:46.609523 systemd[1]: sshd@16-172.24.4.200:22-172.24.4.1:59608.service: Deactivated successfully. Feb 12 20:40:46.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.200:22-172.24.4.1:59608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:46.611371 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 20:40:46.629491 systemd-logind[1049]: Session 17 logged out. Waiting for processes to exit. Feb 12 20:40:46.630457 kernel: audit: type=1131 audit(1707770446.609:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.200:22-172.24.4.1:59608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:46.632540 systemd-logind[1049]: Removed session 17. Feb 12 20:40:48.086000 audit[4406]: USER_ACCT pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:48.087124 sshd[4406]: Accepted publickey for core from 172.24.4.1 port 33792 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:48.097286 kernel: audit: type=1101 audit(1707770448.086:1447): pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:48.098000 audit[4406]: CRED_ACQ pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:48.100130 sshd[4406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:48.115847 kernel: audit: type=1103 audit(1707770448.098:1448): pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:48.115984 kernel: audit: type=1006 audit(1707770448.099:1449): pid=4406 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 20:40:48.099000 audit[4406]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96623680 a2=3 a3=0 items=0 ppid=1 pid=4406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:48.126926 kernel: audit: type=1300 audit(1707770448.099:1449): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff96623680 a2=3 a3=0 items=0 ppid=1 pid=4406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:48.099000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:48.132326 kernel: audit: type=1327 audit(1707770448.099:1449): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:48.138488 systemd-logind[1049]: New session 18 of user core. Feb 12 20:40:48.140725 systemd[1]: Started session-18.scope. Feb 12 20:40:48.153000 audit[4406]: USER_START pid=4406 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:48.157000 audit[4412]: CRED_ACQ pid=4412 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:48.167339 kernel: audit: type=1105 audit(1707770448.153:1450): pid=4406 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:50.418000 audit[4422]: NETFILTER_CFG table=filter:121 family=2 entries=22 op=nft_register_rule pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:50.418000 audit[4422]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7fff999207a0 a2=0 a3=7fff9992078c items=0 ppid=2077 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:50.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:50.420000 audit[4422]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:50.420000 audit[4422]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fff999207a0 a2=0 a3=4f4e203b7374726f items=0 ppid=2077 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:50.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:50.433000 audit[4424]: NETFILTER_CFG table=filter:123 family=2 entries=34 op=nft_register_rule pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:50.433000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd6de7b0c0 a2=0 a3=7ffd6de7b0ac items=0 ppid=2077 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:50.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:50.435000 audit[4424]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:50.435000 audit[4424]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd6de7b0c0 a2=0 a3=4f4e203b7374726f items=0 ppid=2077 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:50.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:50.684358 sshd[4406]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:50.691000 audit[4406]: USER_END pid=4406 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:50.691000 audit[4406]: CRED_DISP pid=4406 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:50.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.200:22-172.24.4.1:33808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:50.692629 systemd[1]: Started sshd@18-172.24.4.200:22-172.24.4.1:33808.service. Feb 12 20:40:50.696405 systemd[1]: sshd@17-172.24.4.200:22-172.24.4.1:33792.service: Deactivated successfully. Feb 12 20:40:50.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.200:22-172.24.4.1:33792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:50.703099 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 20:40:50.704381 systemd[1]: session-18.scope: Consumed 1.006s CPU time. Feb 12 20:40:50.706865 systemd-logind[1049]: Session 18 logged out. Waiting for processes to exit. Feb 12 20:40:50.710010 systemd-logind[1049]: Removed session 18. Feb 12 20:40:51.280000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:51.280000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001582de0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:40:51.280000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:40:51.281000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:51.281000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001582e00 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:40:51.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:40:51.285000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:51.285000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000eb8660 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:40:51.285000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:40:51.287000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:40:51.287000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001582e20 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:40:51.287000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:40:52.165698 kernel: kauditd_printk_skb: 29 callbacks suppressed Feb 12 20:40:52.165955 kernel: audit: type=1101 audit(1707770452.161:1464): pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.161000 audit[4426]: USER_ACCT pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.166398 sshd[4426]: Accepted publickey for core from 172.24.4.1 port 33808 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:52.168032 sshd[4426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:52.164000 audit[4426]: CRED_ACQ pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.187405 kernel: audit: type=1103 audit(1707770452.164:1465): pid=4426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.194705 kernel: audit: type=1006 audit(1707770452.164:1466): pid=4426 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 20:40:52.194848 kernel: audit: type=1300 audit(1707770452.164:1466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd45f2ae30 a2=3 a3=0 items=0 ppid=1 pid=4426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:52.164000 audit[4426]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd45f2ae30 a2=3 a3=0 items=0 ppid=1 pid=4426 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:52.164000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:52.209461 kernel: audit: type=1327 audit(1707770452.164:1466): proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:52.217999 systemd-logind[1049]: New session 19 of user core. Feb 12 20:40:52.220640 systemd[1]: Started session-19.scope. Feb 12 20:40:52.239000 audit[4426]: USER_START pid=4426 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.252880 kernel: audit: type=1105 audit(1707770452.239:1467): pid=4426 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.239000 audit[4430]: CRED_ACQ pid=4430 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.262276 kernel: audit: type=1103 audit(1707770452.239:1468): pid=4430 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:52.289715 systemd[1]: run-containerd-runc-k8s.io-2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2-runc.qCn4x8.mount: Deactivated successfully. Feb 12 20:40:54.079080 sshd[4426]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:54.081000 audit[4426]: USER_END pid=4426 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:54.086992 systemd[1]: sshd@18-172.24.4.200:22-172.24.4.1:33808.service: Deactivated successfully. Feb 12 20:40:54.097061 kernel: audit: type=1106 audit(1707770454.081:1469): pid=4426 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:54.104449 kernel: audit: type=1104 audit(1707770454.081:1470): pid=4426 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:54.081000 audit[4426]: CRED_DISP pid=4426 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:54.088497 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 20:40:54.105343 kernel: audit: type=1131 audit(1707770454.087:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.200:22-172.24.4.1:33808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:54.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.200:22-172.24.4.1:33808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:54.106804 systemd[1]: Started sshd@19-172.24.4.200:22-172.24.4.1:33812.service. Feb 12 20:40:54.115112 systemd-logind[1049]: Session 19 logged out. Waiting for processes to exit. Feb 12 20:40:54.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.200:22-172.24.4.1:33812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:54.118203 systemd-logind[1049]: Removed session 19. Feb 12 20:40:55.253000 audit[4458]: USER_ACCT pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:55.254102 sshd[4458]: Accepted publickey for core from 172.24.4.1 port 33812 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:40:55.255000 audit[4458]: CRED_ACQ pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:55.255000 audit[4458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcba5a0120 a2=3 a3=0 items=0 ppid=1 pid=4458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:55.255000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:40:55.256767 sshd[4458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:40:55.267060 systemd-logind[1049]: New session 20 of user core. Feb 12 20:40:55.268975 systemd[1]: Started session-20.scope. Feb 12 20:40:55.282000 audit[4458]: USER_START pid=4458 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:55.284000 audit[4461]: CRED_ACQ pid=4461 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:56.295091 sshd[4458]: pam_unix(sshd:session): session closed for user core Feb 12 20:40:56.297000 audit[4458]: USER_END pid=4458 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:56.297000 audit[4458]: CRED_DISP pid=4458 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:40:56.300586 systemd[1]: sshd@19-172.24.4.200:22-172.24.4.1:33812.service: Deactivated successfully. Feb 12 20:40:56.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.200:22-172.24.4.1:33812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:40:56.302112 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 20:40:56.303581 systemd-logind[1049]: Session 20 logged out. Waiting for processes to exit. Feb 12 20:40:56.305419 systemd-logind[1049]: Removed session 20. Feb 12 20:40:59.079000 audit[4482]: NETFILTER_CFG table=filter:125 family=2 entries=22 op=nft_register_rule pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:59.083210 kernel: kauditd_printk_skb: 11 callbacks suppressed Feb 12 20:40:59.083405 kernel: audit: type=1325 audit(1707770459.079:1481): table=filter:125 family=2 entries=22 op=nft_register_rule pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:59.079000 audit[4482]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe4e0d6d20 a2=0 a3=7ffe4e0d6d0c items=0 ppid=2077 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:59.106310 kernel: audit: type=1300 audit(1707770459.079:1481): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe4e0d6d20 a2=0 a3=7ffe4e0d6d0c items=0 ppid=2077 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:59.106550 kernel: audit: type=1327 audit(1707770459.079:1481): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:59.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:59.111000 audit[4482]: NETFILTER_CFG table=nat:126 family=2 entries=104 op=nft_register_chain pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:59.111000 audit[4482]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffe4e0d6d20 a2=0 a3=7ffe4e0d6d0c items=0 ppid=2077 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:59.122968 kernel: audit: type=1325 audit(1707770459.111:1482): table=nat:126 family=2 entries=104 op=nft_register_chain pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:40:59.123071 kernel: audit: type=1300 audit(1707770459.111:1482): arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffe4e0d6d20 a2=0 a3=7ffe4e0d6d0c items=0 ppid=2077 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:40:59.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:40:59.126311 kernel: audit: type=1327 audit(1707770459.111:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:01.309175 systemd[1]: Started sshd@20-172.24.4.200:22-172.24.4.1:56148.service. Feb 12 20:41:01.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.200:22-172.24.4.1:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:01.325335 kernel: audit: type=1130 audit(1707770461.311:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.200:22-172.24.4.1:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:02.555000 audit[4508]: USER_ACCT pid=4508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:02.559617 sshd[4508]: Accepted publickey for core from 172.24.4.1 port 56148 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:41:02.563140 kernel: audit: type=1101 audit(1707770462.555:1484): pid=4508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:02.563324 kernel: audit: type=1103 audit(1707770462.562:1485): pid=4508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:02.562000 audit[4508]: CRED_ACQ pid=4508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:02.568653 sshd[4508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:41:02.571351 kernel: audit: type=1006 audit(1707770462.562:1486): pid=4508 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Feb 12 20:41:02.562000 audit[4508]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0d70b820 a2=3 a3=0 items=0 ppid=1 pid=4508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:02.562000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:02.576033 systemd[1]: Started session-21.scope. Feb 12 20:41:02.577562 systemd-logind[1049]: New session 21 of user core. Feb 12 20:41:02.587000 audit[4508]: USER_START pid=4508 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:02.588000 audit[4511]: CRED_ACQ pid=4511 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:03.463785 sshd[4508]: pam_unix(sshd:session): session closed for user core Feb 12 20:41:03.464000 audit[4508]: USER_END pid=4508 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:03.464000 audit[4508]: CRED_DISP pid=4508 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:03.466661 systemd[1]: sshd@20-172.24.4.200:22-172.24.4.1:56148.service: Deactivated successfully. Feb 12 20:41:03.467560 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 20:41:03.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.200:22-172.24.4.1:56148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:03.468257 systemd-logind[1049]: Session 21 logged out. Waiting for processes to exit. Feb 12 20:41:03.469245 systemd-logind[1049]: Removed session 21. Feb 12 20:41:07.220000 audit[4549]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:07.223469 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 20:41:07.238407 kernel: audit: type=1325 audit(1707770467.220:1492): table=filter:127 family=2 entries=9 op=nft_register_rule pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:07.238459 kernel: audit: type=1300 audit(1707770467.220:1492): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff1eeb5b80 a2=0 a3=7fff1eeb5b6c items=0 ppid=2077 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:07.220000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff1eeb5b80 a2=0 a3=7fff1eeb5b6c items=0 ppid=2077 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:07.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:07.247360 kernel: audit: type=1327 audit(1707770467.220:1492): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:07.250000 audit[4549]: NETFILTER_CFG table=nat:128 family=2 entries=51 op=nft_register_chain pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:07.250000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7fff1eeb5b80 a2=0 a3=7fff1eeb5b6c items=0 ppid=2077 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:07.276046 kernel: audit: type=1325 audit(1707770467.250:1493): table=nat:128 family=2 entries=51 op=nft_register_chain pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:07.276090 kernel: audit: type=1300 audit(1707770467.250:1493): arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7fff1eeb5b80 a2=0 a3=7fff1eeb5b6c items=0 ppid=2077 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:07.276169 kernel: audit: type=1327 audit(1707770467.250:1493): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:07.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:08.116000 audit[4552]: NETFILTER_CFG table=filter:129 family=2 entries=8 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:08.116000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd85ae2720 a2=0 a3=7ffd85ae270c items=0 ppid=2077 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:08.137204 kernel: audit: type=1325 audit(1707770468.116:1494): table=filter:129 family=2 entries=8 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:08.137582 kernel: audit: type=1300 audit(1707770468.116:1494): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd85ae2720 a2=0 a3=7ffd85ae270c items=0 ppid=2077 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:08.137676 kernel: audit: type=1327 audit(1707770468.116:1494): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:08.116000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:08.123000 audit[4552]: NETFILTER_CFG table=nat:130 family=2 entries=58 op=nft_register_chain pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:08.151433 kernel: audit: type=1325 audit(1707770468.123:1495): table=nat:130 family=2 entries=58 op=nft_register_chain pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:41:08.123000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7ffd85ae2720 a2=0 a3=7ffd85ae270c items=0 ppid=2077 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:08.123000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:41:08.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.200:22-172.24.4.1:59960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:08.474321 systemd[1]: Started sshd@21-172.24.4.200:22-172.24.4.1:59960.service. Feb 12 20:41:09.813000 audit[4554]: USER_ACCT pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:09.814469 sshd[4554]: Accepted publickey for core from 172.24.4.1 port 59960 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:41:09.816000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:09.816000 audit[4554]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe708276f0 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:09.816000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:09.818361 sshd[4554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:41:09.830698 systemd-logind[1049]: New session 22 of user core. Feb 12 20:41:09.832259 systemd[1]: Started session-22.scope. Feb 12 20:41:09.846000 audit[4554]: USER_START pid=4554 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:09.850000 audit[4558]: CRED_ACQ pid=4558 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:10.657286 sshd[4554]: pam_unix(sshd:session): session closed for user core Feb 12 20:41:10.659000 audit[4554]: USER_END pid=4554 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:10.659000 audit[4554]: CRED_DISP pid=4554 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:10.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.200:22-172.24.4.1:59960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:10.663064 systemd[1]: sshd@21-172.24.4.200:22-172.24.4.1:59960.service: Deactivated successfully. Feb 12 20:41:10.665690 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 20:41:10.668526 systemd-logind[1049]: Session 22 logged out. Waiting for processes to exit. Feb 12 20:41:10.670503 systemd-logind[1049]: Removed session 22. Feb 12 20:41:15.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.200:22-172.24.4.1:36996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:15.670271 systemd[1]: Started sshd@22-172.24.4.200:22-172.24.4.1:36996.service. Feb 12 20:41:15.674303 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 20:41:15.674489 kernel: audit: type=1130 audit(1707770475.670:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.200:22-172.24.4.1:36996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:17.245076 sshd[4568]: Accepted publickey for core from 172.24.4.1 port 36996 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:41:17.244000 audit[4568]: USER_ACCT pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.256305 kernel: audit: type=1101 audit(1707770477.244:1506): pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.255000 audit[4568]: CRED_ACQ pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.267323 kernel: audit: type=1103 audit(1707770477.255:1507): pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.256971 sshd[4568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:41:17.255000 audit[4568]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e491480 a2=3 a3=0 items=0 ppid=1 pid=4568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:17.287812 kernel: audit: type=1006 audit(1707770477.255:1508): pid=4568 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 20:41:17.287987 kernel: audit: type=1300 audit(1707770477.255:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6e491480 a2=3 a3=0 items=0 ppid=1 pid=4568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:17.255000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:17.293297 kernel: audit: type=1327 audit(1707770477.255:1508): proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:17.297567 systemd-logind[1049]: New session 23 of user core. Feb 12 20:41:17.300671 systemd[1]: Started session-23.scope. Feb 12 20:41:17.311000 audit[4568]: USER_START pid=4568 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.311000 audit[4570]: CRED_ACQ pid=4570 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.333850 kernel: audit: type=1105 audit(1707770477.311:1509): pid=4568 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:17.333966 kernel: audit: type=1103 audit(1707770477.311:1510): pid=4570 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:18.068891 sshd[4568]: pam_unix(sshd:session): session closed for user core Feb 12 20:41:18.071000 audit[4568]: USER_END pid=4568 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:18.085326 kernel: audit: type=1106 audit(1707770478.071:1511): pid=4568 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:18.085523 kernel: audit: type=1104 audit(1707770478.071:1512): pid=4568 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:18.071000 audit[4568]: CRED_DISP pid=4568 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:18.082166 systemd[1]: sshd@22-172.24.4.200:22-172.24.4.1:36996.service: Deactivated successfully. Feb 12 20:41:18.083952 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 20:41:18.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.200:22-172.24.4.1:36996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:18.102648 systemd-logind[1049]: Session 23 logged out. Waiting for processes to exit. Feb 12 20:41:18.104502 systemd-logind[1049]: Removed session 23. Feb 12 20:41:22.272795 systemd[1]: run-containerd-runc-k8s.io-2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2-runc.90Z7C4.mount: Deactivated successfully. Feb 12 20:41:23.084371 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:41:23.084687 kernel: audit: type=1130 audit(1707770483.081:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.200:22-172.24.4.1:37010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:23.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.200:22-172.24.4.1:37010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:23.081341 systemd[1]: Started sshd@23-172.24.4.200:22-172.24.4.1:37010.service. Feb 12 20:41:24.156190 systemd[1]: run-containerd-runc-k8s.io-2e227319f03bda4ff6715e36e3b11de05e7d64300f9e0a9dd6364fe7f08c5ec2-runc.zPrmH8.mount: Deactivated successfully. Feb 12 20:41:24.374000 audit[4605]: USER_ACCT pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.375800 sshd[4605]: Accepted publickey for core from 172.24.4.1 port 37010 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:41:24.386594 kernel: audit: type=1101 audit(1707770484.374:1515): pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.388155 sshd[4605]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:41:24.381000 audit[4605]: CRED_ACQ pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.395464 kernel: audit: type=1103 audit(1707770484.381:1516): pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.397652 systemd-logind[1049]: New session 24 of user core. Feb 12 20:41:24.398252 systemd[1]: Started session-24.scope. Feb 12 20:41:24.403286 kernel: audit: type=1006 audit(1707770484.381:1517): pid=4605 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 20:41:24.404867 kernel: audit: type=1300 audit(1707770484.381:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe52e50870 a2=3 a3=0 items=0 ppid=1 pid=4605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:24.381000 audit[4605]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe52e50870 a2=3 a3=0 items=0 ppid=1 pid=4605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:24.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:24.409889 kernel: audit: type=1327 audit(1707770484.381:1517): proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:24.414000 audit[4605]: USER_START pid=4605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.420307 kernel: audit: type=1105 audit(1707770484.414:1518): pid=4605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.420000 audit[4627]: CRED_ACQ pid=4627 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:24.431287 kernel: audit: type=1103 audit(1707770484.420:1519): pid=4627 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:25.488894 sshd[4605]: pam_unix(sshd:session): session closed for user core Feb 12 20:41:25.491000 audit[4605]: USER_END pid=4605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:25.497338 systemd[1]: sshd@23-172.24.4.200:22-172.24.4.1:37010.service: Deactivated successfully. Feb 12 20:41:25.499794 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 20:41:25.507280 kernel: audit: type=1106 audit(1707770485.491:1520): pid=4605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:25.508549 systemd-logind[1049]: Session 24 logged out. Waiting for processes to exit. Feb 12 20:41:25.492000 audit[4605]: CRED_DISP pid=4605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:25.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.200:22-172.24.4.1:37010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:25.524751 kernel: audit: type=1104 audit(1707770485.492:1521): pid=4605 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:25.524162 systemd-logind[1049]: Removed session 24. Feb 12 20:41:30.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.200:22-172.24.4.1:42838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:30.498911 systemd[1]: Started sshd@24-172.24.4.200:22-172.24.4.1:42838.service. Feb 12 20:41:30.502123 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:41:30.502291 kernel: audit: type=1130 audit(1707770490.499:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.200:22-172.24.4.1:42838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:32.227000 audit[4663]: USER_ACCT pid=4663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.228565 sshd[4663]: Accepted publickey for core from 172.24.4.1 port 42838 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:41:32.240311 kernel: audit: type=1101 audit(1707770492.227:1524): pid=4663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.239000 audit[4663]: CRED_ACQ pid=4663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.242534 sshd[4663]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:41:32.258652 kernel: audit: type=1103 audit(1707770492.239:1525): pid=4663 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.258780 kernel: audit: type=1006 audit(1707770492.239:1526): pid=4663 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 20:41:32.258849 kernel: audit: type=1300 audit(1707770492.239:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf7a71e20 a2=3 a3=0 items=0 ppid=1 pid=4663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:32.239000 audit[4663]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf7a71e20 a2=3 a3=0 items=0 ppid=1 pid=4663 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:41:32.239000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:32.276344 kernel: audit: type=1327 audit(1707770492.239:1526): proctitle=737368643A20636F7265205B707269765D Feb 12 20:41:32.281270 systemd-logind[1049]: New session 25 of user core. Feb 12 20:41:32.282036 systemd[1]: Started session-25.scope. Feb 12 20:41:32.296000 audit[4663]: USER_START pid=4663 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.299000 audit[4665]: CRED_ACQ pid=4665 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.319063 kernel: audit: type=1105 audit(1707770492.296:1527): pid=4663 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:32.319343 kernel: audit: type=1103 audit(1707770492.299:1528): pid=4665 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:33.077056 sshd[4663]: pam_unix(sshd:session): session closed for user core Feb 12 20:41:33.079000 audit[4663]: USER_END pid=4663 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:33.096558 kernel: audit: type=1106 audit(1707770493.079:1529): pid=4663 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:33.097204 kernel: audit: type=1104 audit(1707770493.079:1530): pid=4663 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:33.079000 audit[4663]: CRED_DISP pid=4663 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:41:33.093650 systemd[1]: sshd@24-172.24.4.200:22-172.24.4.1:42838.service: Deactivated successfully. Feb 12 20:41:33.095491 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 20:41:33.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.200:22-172.24.4.1:42838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:41:33.104877 systemd-logind[1049]: Session 25 logged out. Waiting for processes to exit. Feb 12 20:41:33.107541 systemd-logind[1049]: Removed session 25. Feb 12 20:41:36.237000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:36.238974 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 20:41:36.239081 kernel: audit: type=1400 audit(1707770496.237:1532): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:36.237000 audit[1796]: AVC avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:36.250081 kernel: audit: type=1400 audit(1707770496.237:1533): avc: denied { watch } for pid=1796 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:36.250261 kernel: audit: type=1300 audit(1707770496.237:1533): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00277f2c0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:41:36.237000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00277f2c0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:41:36.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:41:36.263512 kernel: audit: type=1327 audit(1707770496.237:1533): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:41:36.237000 audit[1796]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002902cf0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:41:36.270828 kernel: audit: type=1300 audit(1707770496.237:1532): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002902cf0 a2=fc6 a3=0 items=0 ppid=1643 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c578 key=(null) Feb 12 20:41:36.270950 kernel: audit: type=1327 audit(1707770496.237:1532): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:41:36.237000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 20:41:36.948817 systemd[1]: run-containerd-runc-k8s.io-68110bd37ebe7f55275f1837008240c7961196134a7767b2865590dd90e82df2-runc.k0e3gP.mount: Deactivated successfully. Feb 12 20:41:38.196000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.210528 kernel: audit: type=1400 audit(1707770498.196:1534): avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524818 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.210778 kernel: audit: type=1300 audit(1707770498.196:1534): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013160930 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.196000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013160930 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.196000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:41:38.239987 kernel: audit: type=1327 audit(1707770498.196:1534): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:41:38.240195 kernel: audit: type=1400 audit(1707770498.197:1535): avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.197000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.197000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013160960 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.197000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:41:38.200000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.200000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c012447960 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.200000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:41:38.218000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524812 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.218000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013160a20 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:41:38.271000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524816 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.271000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c013160b70 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 20:41:38.271000 audit[1821]: AVC avc: denied { watch } for pid=1821 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524807 scontext=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 20:41:38.271000 audit[1821]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c011cb9340 a2=fc6 a3=0 items=0 ppid=1670 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c231,c879 key=(null) Feb 12 20:41:38.271000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323030002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562