Apr 12 18:48:14.135366 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:48:14.135406 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:48:14.135423 kernel: BIOS-provided physical RAM map: Apr 12 18:48:14.135435 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Apr 12 18:48:14.135447 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Apr 12 18:48:14.135458 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Apr 12 18:48:14.135476 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Apr 12 18:48:14.135489 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Apr 12 18:48:14.135501 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Apr 12 18:48:14.135514 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Apr 12 18:48:14.135527 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Apr 12 18:48:14.135540 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Apr 12 18:48:14.135552 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Apr 12 18:48:14.135565 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Apr 12 18:48:14.135584 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Apr 12 18:48:14.135598 kernel: NX (Execute Disable) protection: active Apr 12 18:48:14.135612 kernel: efi: EFI v2.70 by EDK II Apr 12 18:48:14.135626 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe36f198 RNG=0xbfb73018 TPMEventLog=0xbe2b3018 Apr 12 18:48:14.135640 kernel: random: crng init done Apr 12 18:48:14.135654 kernel: SMBIOS 2.4 present. Apr 12 18:48:14.135667 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Apr 12 18:48:14.135680 kernel: Hypervisor detected: KVM Apr 12 18:48:14.135697 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:48:14.135710 kernel: kvm-clock: cpu 0, msr 21a191001, primary cpu clock Apr 12 18:48:14.135724 kernel: kvm-clock: using sched offset of 12967728690 cycles Apr 12 18:48:14.135739 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:48:14.135753 kernel: tsc: Detected 2299.998 MHz processor Apr 12 18:48:14.135766 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:48:14.135780 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:48:14.135794 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Apr 12 18:48:14.135808 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:48:14.135822 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Apr 12 18:48:14.135839 kernel: Using GB pages for direct mapping Apr 12 18:48:14.135852 kernel: Secure boot disabled Apr 12 18:48:14.135866 kernel: ACPI: Early table checksum verification disabled Apr 12 18:48:14.135879 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Apr 12 18:48:14.135893 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Apr 12 18:48:14.135906 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Apr 12 18:48:14.135920 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Apr 12 18:48:14.135935 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Apr 12 18:48:14.135957 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Apr 12 18:48:14.135972 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Apr 12 18:48:14.135987 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Apr 12 18:48:14.136002 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Apr 12 18:48:14.136018 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Apr 12 18:48:14.136032 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Apr 12 18:48:14.136051 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Apr 12 18:48:14.136065 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Apr 12 18:48:14.136080 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Apr 12 18:48:14.136108 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Apr 12 18:48:14.136123 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Apr 12 18:48:14.136137 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Apr 12 18:48:14.136151 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Apr 12 18:48:14.136166 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Apr 12 18:48:14.136181 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Apr 12 18:48:14.136200 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:48:14.136215 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 18:48:14.136230 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Apr 12 18:48:14.136244 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Apr 12 18:48:14.136266 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Apr 12 18:48:14.136281 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Apr 12 18:48:14.136296 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Apr 12 18:48:14.136311 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Apr 12 18:48:14.136326 kernel: Zone ranges: Apr 12 18:48:14.136344 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:48:14.136359 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 18:48:14.136374 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:48:14.136388 kernel: Movable zone start for each node Apr 12 18:48:14.136403 kernel: Early memory node ranges Apr 12 18:48:14.136418 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Apr 12 18:48:14.136433 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Apr 12 18:48:14.136448 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Apr 12 18:48:14.136463 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Apr 12 18:48:14.136480 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:48:14.136495 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Apr 12 18:48:14.136510 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:48:14.136525 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Apr 12 18:48:14.136540 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Apr 12 18:48:14.136555 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Apr 12 18:48:14.136569 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Apr 12 18:48:14.136584 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 18:48:14.136599 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:48:14.136617 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:48:14.136632 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:48:14.136646 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:48:14.143284 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:48:14.143303 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:48:14.143321 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:48:14.143336 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:48:14.143352 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Apr 12 18:48:14.143368 kernel: Booting paravirtualized kernel on KVM Apr 12 18:48:14.143392 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:48:14.143408 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:48:14.143425 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:48:14.143440 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:48:14.143455 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:48:14.143470 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:48:14.143486 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:48:14.143502 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Apr 12 18:48:14.143518 kernel: Policy zone: Normal Apr 12 18:48:14.143541 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:48:14.143558 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:48:14.143573 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Apr 12 18:48:14.143590 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:48:14.143606 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:48:14.143622 kernel: Memory: 7534432K/7860584K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 325892K reserved, 0K cma-reserved) Apr 12 18:48:14.143638 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:48:14.143653 kernel: Kernel/User page tables isolation: enabled Apr 12 18:48:14.143671 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:48:14.143686 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:48:14.143701 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:48:14.143718 kernel: rcu: RCU event tracing is enabled. Apr 12 18:48:14.143733 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:48:14.143749 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:48:14.143764 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:48:14.143779 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:48:14.143795 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:48:14.143815 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:48:14.143843 kernel: Console: colour dummy device 80x25 Apr 12 18:48:14.143860 kernel: printk: console [ttyS0] enabled Apr 12 18:48:14.143880 kernel: ACPI: Core revision 20210730 Apr 12 18:48:14.143897 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:48:14.143912 kernel: x2apic enabled Apr 12 18:48:14.143928 kernel: Switched APIC routing to physical x2apic. Apr 12 18:48:14.143944 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Apr 12 18:48:14.143960 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:48:14.143977 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Apr 12 18:48:14.143997 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Apr 12 18:48:14.144013 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Apr 12 18:48:14.144030 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:48:14.144048 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 18:48:14.144065 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 18:48:14.144096 kernel: Spectre V2 : Mitigation: IBRS Apr 12 18:48:14.144118 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:48:14.144135 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:48:14.144151 kernel: RETBleed: Mitigation: IBRS Apr 12 18:48:14.144168 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:48:14.144185 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Apr 12 18:48:14.144201 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:48:14.144219 kernel: MDS: Mitigation: Clear CPU buffers Apr 12 18:48:14.144237 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:48:14.144262 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:48:14.144284 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:48:14.144301 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:48:14.144318 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:48:14.144337 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:48:14.144354 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:48:14.144372 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:48:14.144390 kernel: LSM: Security Framework initializing Apr 12 18:48:14.144407 kernel: SELinux: Initializing. Apr 12 18:48:14.144424 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:48:14.144446 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:48:14.144464 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Apr 12 18:48:14.144482 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Apr 12 18:48:14.144499 kernel: signal: max sigframe size: 1776 Apr 12 18:48:14.144516 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:48:14.144533 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:48:14.144551 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:48:14.144568 kernel: x86: Booting SMP configuration: Apr 12 18:48:14.144584 kernel: .... node #0, CPUs: #1 Apr 12 18:48:14.144606 kernel: kvm-clock: cpu 1, msr 21a191041, secondary cpu clock Apr 12 18:48:14.144622 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 18:48:14.144641 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 18:48:14.144657 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:48:14.144673 kernel: smpboot: Max logical packages: 1 Apr 12 18:48:14.144690 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Apr 12 18:48:14.144706 kernel: devtmpfs: initialized Apr 12 18:48:14.144720 kernel: x86/mm: Memory block size: 128MB Apr 12 18:48:14.144737 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Apr 12 18:48:14.144756 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:48:14.144772 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:48:14.144789 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:48:14.144805 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:48:14.144821 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:48:14.144837 kernel: audit: type=2000 audit(1712947693.045:1): state=initialized audit_enabled=0 res=1 Apr 12 18:48:14.144853 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:48:14.144869 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:48:14.144888 kernel: cpuidle: using governor menu Apr 12 18:48:14.144904 kernel: ACPI: bus type PCI registered Apr 12 18:48:14.144920 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:48:14.144936 kernel: dca service started, version 1.12.1 Apr 12 18:48:14.144952 kernel: PCI: Using configuration type 1 for base access Apr 12 18:48:14.144969 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:48:14.144985 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:48:14.145001 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:48:14.145018 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:48:14.145035 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:48:14.145055 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:48:14.145071 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:48:14.145101 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:48:14.145117 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:48:14.145133 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:48:14.145150 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 18:48:14.145167 kernel: ACPI: Interpreter enabled Apr 12 18:48:14.145184 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:48:14.145201 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:48:14.145221 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:48:14.145236 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 18:48:14.145262 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:48:14.145512 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:48:14.145682 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:48:14.145705 kernel: PCI host bridge to bus 0000:00 Apr 12 18:48:14.145863 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:48:14.146017 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:48:14.156281 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:48:14.156456 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Apr 12 18:48:14.156600 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:48:14.156791 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:48:14.156971 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Apr 12 18:48:14.157189 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:48:14.157361 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 18:48:14.157542 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Apr 12 18:48:14.157710 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Apr 12 18:48:14.157894 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Apr 12 18:48:14.158105 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:48:14.158280 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Apr 12 18:48:14.158455 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Apr 12 18:48:14.158632 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:48:14.158814 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:48:14.158985 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Apr 12 18:48:14.159009 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:48:14.159026 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:48:14.159043 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:48:14.159065 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:48:14.159117 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:48:14.159136 kernel: iommu: Default domain type: Translated Apr 12 18:48:14.159155 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:48:14.159173 kernel: vgaarb: loaded Apr 12 18:48:14.159191 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:48:14.159209 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:48:14.159227 kernel: PTP clock support registered Apr 12 18:48:14.159245 kernel: Registered efivars operations Apr 12 18:48:14.159268 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:48:14.159286 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:48:14.159302 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Apr 12 18:48:14.159320 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Apr 12 18:48:14.159337 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Apr 12 18:48:14.159354 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Apr 12 18:48:14.159370 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:48:14.159388 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:48:14.159406 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:48:14.159428 kernel: pnp: PnP ACPI init Apr 12 18:48:14.159446 kernel: pnp: PnP ACPI: found 7 devices Apr 12 18:48:14.159464 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:48:14.159483 kernel: NET: Registered PF_INET protocol family Apr 12 18:48:14.159501 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:48:14.159520 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Apr 12 18:48:14.159538 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:48:14.159556 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:48:14.159573 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 18:48:14.159595 kernel: TCP: Hash tables configured (established 65536 bind 65536) Apr 12 18:48:14.159613 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:48:14.159631 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:48:14.159649 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:48:14.159667 kernel: NET: Registered PF_XDP protocol family Apr 12 18:48:14.159848 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:48:14.160012 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:48:14.160186 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:48:14.160335 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Apr 12 18:48:14.160502 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:48:14.160526 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:48:14.160544 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 18:48:14.160559 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Apr 12 18:48:14.160574 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:48:14.160590 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:48:14.160606 kernel: clocksource: Switched to clocksource tsc Apr 12 18:48:14.160628 kernel: Initialise system trusted keyrings Apr 12 18:48:14.160644 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Apr 12 18:48:14.160662 kernel: Key type asymmetric registered Apr 12 18:48:14.160679 kernel: Asymmetric key parser 'x509' registered Apr 12 18:48:14.160696 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:48:14.160713 kernel: io scheduler mq-deadline registered Apr 12 18:48:14.160731 kernel: io scheduler kyber registered Apr 12 18:48:14.160748 kernel: io scheduler bfq registered Apr 12 18:48:14.160776 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:48:14.160799 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:48:14.160981 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Apr 12 18:48:14.161006 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:48:14.161199 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Apr 12 18:48:14.161224 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:48:14.161394 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Apr 12 18:48:14.161417 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:48:14.161436 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:48:14.161454 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 18:48:14.161477 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Apr 12 18:48:14.161494 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Apr 12 18:48:14.161666 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Apr 12 18:48:14.161691 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:48:14.161709 kernel: i8042: Warning: Keylock active Apr 12 18:48:14.161727 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:48:14.161744 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:48:14.161916 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 18:48:14.162074 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 18:48:14.177709 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:48:13 UTC (1712947693) Apr 12 18:48:14.177961 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 18:48:14.177985 kernel: intel_pstate: CPU model not supported Apr 12 18:48:14.178004 kernel: pstore: Registered efi as persistent store backend Apr 12 18:48:14.178022 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:48:14.178040 kernel: Segment Routing with IPv6 Apr 12 18:48:14.178057 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:48:14.178094 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:48:14.178112 kernel: Key type dns_resolver registered Apr 12 18:48:14.178130 kernel: IPI shorthand broadcast: enabled Apr 12 18:48:14.178147 kernel: sched_clock: Marking stable (723577623, 158482715)->(946926762, -64866424) Apr 12 18:48:14.178165 kernel: registered taskstats version 1 Apr 12 18:48:14.178182 kernel: Loading compiled-in X.509 certificates Apr 12 18:48:14.178200 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:48:14.178218 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:48:14.178235 kernel: Key type .fscrypt registered Apr 12 18:48:14.178263 kernel: Key type fscrypt-provisioning registered Apr 12 18:48:14.178281 kernel: pstore: Using crash dump compression: deflate Apr 12 18:48:14.178298 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:48:14.178316 kernel: ima: No architecture policies found Apr 12 18:48:14.178333 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:48:14.178350 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:48:14.178368 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:48:14.178384 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:48:14.178406 kernel: Run /init as init process Apr 12 18:48:14.178424 kernel: with arguments: Apr 12 18:48:14.178441 kernel: /init Apr 12 18:48:14.178458 kernel: with environment: Apr 12 18:48:14.178475 kernel: HOME=/ Apr 12 18:48:14.178492 kernel: TERM=linux Apr 12 18:48:14.178509 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:48:14.178531 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:48:14.178556 systemd[1]: Detected virtualization kvm. Apr 12 18:48:14.178575 systemd[1]: Detected architecture x86-64. Apr 12 18:48:14.178593 systemd[1]: Running in initrd. Apr 12 18:48:14.178610 systemd[1]: No hostname configured, using default hostname. Apr 12 18:48:14.178628 systemd[1]: Hostname set to . Apr 12 18:48:14.178647 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:48:14.178664 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:48:14.178682 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:48:14.178704 systemd[1]: Reached target cryptsetup.target. Apr 12 18:48:14.178721 systemd[1]: Reached target paths.target. Apr 12 18:48:14.178739 systemd[1]: Reached target slices.target. Apr 12 18:48:14.178757 systemd[1]: Reached target swap.target. Apr 12 18:48:14.178774 systemd[1]: Reached target timers.target. Apr 12 18:48:14.178793 systemd[1]: Listening on iscsid.socket. Apr 12 18:48:14.178812 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:48:14.178834 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:48:14.178853 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:48:14.178871 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:48:14.178889 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:48:14.178907 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:48:14.178925 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:48:14.178943 systemd[1]: Reached target sockets.target. Apr 12 18:48:14.178961 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:48:14.178979 systemd[1]: Finished network-cleanup.service. Apr 12 18:48:14.179001 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:48:14.179020 systemd[1]: Starting systemd-journald.service... Apr 12 18:48:14.179038 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:48:14.179075 systemd[1]: Starting systemd-resolved.service... Apr 12 18:48:14.179110 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:48:14.179128 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:48:14.179147 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:48:14.179171 kernel: audit: type=1130 audit(1712947694.103:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.179190 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:48:14.179209 kernel: audit: type=1130 audit(1712947694.114:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.179228 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:48:14.179247 kernel: audit: type=1130 audit(1712947694.117:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.179273 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:48:14.179292 systemd[1]: Started systemd-resolved.service. Apr 12 18:48:14.179311 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:48:14.179333 kernel: audit: type=1130 audit(1712947694.161:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.179352 systemd[1]: Reached target nss-lookup.target. Apr 12 18:48:14.179371 kernel: audit: type=1130 audit(1712947694.167:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.179389 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:48:14.179414 systemd-journald[189]: Journal started Apr 12 18:48:14.179503 systemd-journald[189]: Runtime Journal (/run/log/journal/ac5b15dff0cf05e69311af63c1ffe2b4) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:48:14.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.111142 systemd-modules-load[190]: Inserted module 'overlay' Apr 12 18:48:14.203613 systemd[1]: Started systemd-journald.service. Apr 12 18:48:14.203659 kernel: audit: type=1130 audit(1712947694.179:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.203685 kernel: audit: type=1130 audit(1712947694.189:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.148841 systemd-resolved[191]: Positive Trust Anchors: Apr 12 18:48:14.148854 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:48:14.148919 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:48:14.220154 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:48:14.153677 systemd-resolved[191]: Defaulting to hostname 'linux'. Apr 12 18:48:14.191656 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:48:14.229137 dracut-cmdline[206]: dracut-dracut-053 Apr 12 18:48:14.229137 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Apr 12 18:48:14.229137 dracut-cmdline[206]: BEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:48:14.246185 kernel: Bridge firewalling registered Apr 12 18:48:14.233002 systemd-modules-load[190]: Inserted module 'br_netfilter' Apr 12 18:48:14.269114 kernel: SCSI subsystem initialized Apr 12 18:48:14.289283 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:48:14.289353 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:48:14.289378 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:48:14.295842 systemd-modules-load[190]: Inserted module 'dm_multipath' Apr 12 18:48:14.297401 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:48:14.316446 kernel: audit: type=1130 audit(1712947694.307:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.316514 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:48:14.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.309594 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:48:14.328720 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:48:14.340215 kernel: audit: type=1130 audit(1712947694.331:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.344123 kernel: iscsi: registered transport (tcp) Apr 12 18:48:14.370745 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:48:14.370832 kernel: QLogic iSCSI HBA Driver Apr 12 18:48:14.415631 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:48:14.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.417901 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:48:14.475145 kernel: raid6: avx2x4 gen() 18156 MB/s Apr 12 18:48:14.493138 kernel: raid6: avx2x4 xor() 8118 MB/s Apr 12 18:48:14.511165 kernel: raid6: avx2x2 gen() 17736 MB/s Apr 12 18:48:14.529181 kernel: raid6: avx2x2 xor() 18597 MB/s Apr 12 18:48:14.546172 kernel: raid6: avx2x1 gen() 14066 MB/s Apr 12 18:48:14.563116 kernel: raid6: avx2x1 xor() 16137 MB/s Apr 12 18:48:14.581164 kernel: raid6: sse2x4 gen() 10989 MB/s Apr 12 18:48:14.598129 kernel: raid6: sse2x4 xor() 6733 MB/s Apr 12 18:48:14.615114 kernel: raid6: sse2x2 gen() 12070 MB/s Apr 12 18:48:14.632148 kernel: raid6: sse2x2 xor() 7393 MB/s Apr 12 18:48:14.649134 kernel: raid6: sse2x1 gen() 10521 MB/s Apr 12 18:48:14.666730 kernel: raid6: sse2x1 xor() 5197 MB/s Apr 12 18:48:14.666794 kernel: raid6: using algorithm avx2x4 gen() 18156 MB/s Apr 12 18:48:14.666829 kernel: raid6: .... xor() 8118 MB/s, rmw enabled Apr 12 18:48:14.667631 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:48:14.684137 kernel: xor: automatically using best checksumming function avx Apr 12 18:48:14.790125 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:48:14.802418 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:48:14.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.802000 audit: BPF prog-id=7 op=LOAD Apr 12 18:48:14.802000 audit: BPF prog-id=8 op=LOAD Apr 12 18:48:14.804141 systemd[1]: Starting systemd-udevd.service... Apr 12 18:48:14.821517 systemd-udevd[388]: Using default interface naming scheme 'v252'. Apr 12 18:48:14.829138 systemd[1]: Started systemd-udevd.service. Apr 12 18:48:14.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.831525 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:48:14.856771 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation Apr 12 18:48:14.898572 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:48:14.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:14.900790 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:48:14.966994 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:48:14.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:15.046113 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:48:15.119118 kernel: scsi host0: Virtio SCSI HBA Apr 12 18:48:15.130116 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Apr 12 18:48:15.189657 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:48:15.189733 kernel: AES CTR mode by8 optimization enabled Apr 12 18:48:15.217485 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Apr 12 18:48:15.217831 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Apr 12 18:48:15.232464 kernel: sd 0:0:1:0: [sda] Write Protect is off Apr 12 18:48:15.232705 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Apr 12 18:48:15.232849 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 18:48:15.247782 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:48:15.247856 kernel: GPT:17805311 != 25165823 Apr 12 18:48:15.247879 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:48:15.253902 kernel: GPT:17805311 != 25165823 Apr 12 18:48:15.257612 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:48:15.267979 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:48:15.274104 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Apr 12 18:48:15.330114 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (449) Apr 12 18:48:15.332056 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:48:15.360682 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:48:15.364926 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:48:15.393204 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:48:15.402584 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:48:15.430206 systemd[1]: Starting disk-uuid.service... Apr 12 18:48:15.444420 disk-uuid[518]: Primary Header is updated. Apr 12 18:48:15.444420 disk-uuid[518]: Secondary Entries is updated. Apr 12 18:48:15.444420 disk-uuid[518]: Secondary Header is updated. Apr 12 18:48:15.470211 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:48:15.486182 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:48:15.500115 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:48:16.498097 disk-uuid[519]: The operation has completed successfully. Apr 12 18:48:16.507256 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:48:16.558974 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:48:16.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:16.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:16.559134 systemd[1]: Finished disk-uuid.service. Apr 12 18:48:16.583403 systemd[1]: Starting verity-setup.service... Apr 12 18:48:16.611109 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:48:16.692977 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:48:16.694695 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:48:16.714619 systemd[1]: Finished verity-setup.service. Apr 12 18:48:16.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:16.796150 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:48:16.796036 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:48:16.803501 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:48:16.847231 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:48:16.847262 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:48:16.847277 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:48:16.804484 systemd[1]: Starting ignition-setup.service... Apr 12 18:48:16.860668 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:48:16.812495 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:48:16.889710 systemd[1]: Finished ignition-setup.service. Apr 12 18:48:16.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:16.899709 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:48:16.934762 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:48:16.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:16.935000 audit: BPF prog-id=9 op=LOAD Apr 12 18:48:16.937152 systemd[1]: Starting systemd-networkd.service... Apr 12 18:48:16.971152 systemd-networkd[693]: lo: Link UP Apr 12 18:48:16.971166 systemd-networkd[693]: lo: Gained carrier Apr 12 18:48:16.971945 systemd-networkd[693]: Enumeration completed Apr 12 18:48:16.972375 systemd-networkd[693]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:48:16.972577 systemd[1]: Started systemd-networkd.service. Apr 12 18:48:17.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:16.974724 systemd-networkd[693]: eth0: Link UP Apr 12 18:48:16.974732 systemd-networkd[693]: eth0: Gained carrier Apr 12 18:48:16.985255 systemd-networkd[693]: eth0: DHCPv4 address 10.128.0.18/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:48:17.012405 systemd[1]: Reached target network.target. Apr 12 18:48:17.062402 systemd[1]: Starting iscsiuio.service... Apr 12 18:48:17.071821 systemd[1]: Started iscsiuio.service. Apr 12 18:48:17.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.089532 systemd[1]: Starting iscsid.service... Apr 12 18:48:17.096883 systemd[1]: Started iscsid.service. Apr 12 18:48:17.110200 iscsid[703]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:48:17.110200 iscsid[703]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:48:17.110200 iscsid[703]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:48:17.110200 iscsid[703]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:48:17.110200 iscsid[703]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:48:17.110200 iscsid[703]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:48:17.110200 iscsid[703]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:48:17.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.169657 ignition[661]: Ignition 2.14.0 Apr 12 18:48:17.156573 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:48:17.169672 ignition[661]: Stage: fetch-offline Apr 12 18:48:17.176639 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:48:17.169770 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:17.207757 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:48:17.169826 ignition[661]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:17.220626 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:48:17.190479 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:17.246323 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:48:17.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.190697 ignition[661]: parsed url from cmdline: "" Apr 12 18:48:17.260327 systemd[1]: Reached target remote-fs.target. Apr 12 18:48:17.190705 ignition[661]: no config URL provided Apr 12 18:48:17.281364 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:48:17.190713 ignition[661]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:48:17.306288 systemd[1]: Starting ignition-fetch.service... Apr 12 18:48:17.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.190727 ignition[661]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:48:17.326811 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:48:17.190736 ignition[661]: failed to fetch config: resource requires networking Apr 12 18:48:17.376501 unknown[718]: fetched base config from "system" Apr 12 18:48:17.191099 ignition[661]: Ignition finished successfully Apr 12 18:48:17.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.376510 unknown[718]: fetched base config from "system" Apr 12 18:48:17.318604 ignition[718]: Ignition 2.14.0 Apr 12 18:48:17.376516 unknown[718]: fetched user config from "gcp" Apr 12 18:48:17.318613 ignition[718]: Stage: fetch Apr 12 18:48:17.380809 systemd[1]: Finished ignition-fetch.service. Apr 12 18:48:17.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.318761 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:17.387537 systemd[1]: Starting ignition-kargs.service... Apr 12 18:48:17.318792 ignition[718]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:17.430570 systemd[1]: Finished ignition-kargs.service. Apr 12 18:48:17.326582 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:17.446541 systemd[1]: Starting ignition-disks.service... Apr 12 18:48:17.326871 ignition[718]: parsed url from cmdline: "" Apr 12 18:48:17.479627 systemd[1]: Finished ignition-disks.service. Apr 12 18:48:17.326877 ignition[718]: no config URL provided Apr 12 18:48:17.485512 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:48:17.326885 ignition[718]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:48:17.505237 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:48:17.326896 ignition[718]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:48:17.522288 systemd[1]: Reached target local-fs.target. Apr 12 18:48:17.326932 ignition[718]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Apr 12 18:48:17.536311 systemd[1]: Reached target sysinit.target. Apr 12 18:48:17.330830 ignition[718]: GET result: OK Apr 12 18:48:17.549371 systemd[1]: Reached target basic.target. Apr 12 18:48:17.330954 ignition[718]: parsing config with SHA512: 2503af515d763e6bf149a0ddb3181edb2cf922ba28236798f35fc2ba1db2e78c84b30387a26fd5aefbfb5bf6739a958c0231ce3a97153cb1b884059127611a76 Apr 12 18:48:17.567540 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:48:17.378903 ignition[718]: fetch: fetch complete Apr 12 18:48:17.378920 ignition[718]: fetch: fetch passed Apr 12 18:48:17.379034 ignition[718]: Ignition finished successfully Apr 12 18:48:17.400653 ignition[724]: Ignition 2.14.0 Apr 12 18:48:17.400663 ignition[724]: Stage: kargs Apr 12 18:48:17.400792 ignition[724]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:17.400825 ignition[724]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:17.409278 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:17.410965 ignition[724]: kargs: kargs passed Apr 12 18:48:17.411017 ignition[724]: Ignition finished successfully Apr 12 18:48:17.457597 ignition[730]: Ignition 2.14.0 Apr 12 18:48:17.457606 ignition[730]: Stage: disks Apr 12 18:48:17.457741 ignition[730]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:17.457771 ignition[730]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:17.464666 ignition[730]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:17.466260 ignition[730]: disks: disks passed Apr 12 18:48:17.466311 ignition[730]: Ignition finished successfully Apr 12 18:48:17.612339 systemd-fsck[738]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:48:17.748046 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:48:17.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:17.749382 systemd[1]: Mounting sysroot.mount... Apr 12 18:48:17.780109 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:48:17.785610 systemd[1]: Mounted sysroot.mount. Apr 12 18:48:17.792417 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:48:17.811992 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:48:17.816895 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:48:17.816945 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:48:17.816978 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:48:17.911291 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (744) Apr 12 18:48:17.911331 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:48:17.911356 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:48:17.911379 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:48:17.836609 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:48:17.924254 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:48:17.859187 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:48:17.933294 initrd-setup-root[767]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:48:17.904212 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:48:17.958636 initrd-setup-root[775]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:48:17.953210 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:48:17.985270 initrd-setup-root[783]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:48:17.995224 initrd-setup-root[791]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:48:18.009019 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:48:18.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:18.018406 systemd[1]: Starting ignition-mount.service... Apr 12 18:48:18.032495 systemd[1]: Starting sysroot-boot.service... Apr 12 18:48:18.041365 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:48:18.041507 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:48:18.075260 ignition[809]: INFO : Ignition 2.14.0 Apr 12 18:48:18.075260 ignition[809]: INFO : Stage: mount Apr 12 18:48:18.075260 ignition[809]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:18.075260 ignition[809]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:18.075260 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:18.075260 ignition[809]: INFO : mount: mount passed Apr 12 18:48:18.075260 ignition[809]: INFO : Ignition finished successfully Apr 12 18:48:18.256245 kernel: kauditd_printk_skb: 24 callbacks suppressed Apr 12 18:48:18.256305 kernel: audit: type=1130 audit(1712947698.082:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:18.256355 kernel: audit: type=1130 audit(1712947698.122:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:18.256380 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (819) Apr 12 18:48:18.256403 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:48:18.256425 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:48:18.256448 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:48:18.256470 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:48:18.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:18.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:18.073990 systemd[1]: Finished ignition-mount.service. Apr 12 18:48:18.085946 systemd[1]: Finished sysroot-boot.service. Apr 12 18:48:18.124650 systemd[1]: Starting ignition-files.service... Apr 12 18:48:18.154379 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:48:18.286353 ignition[838]: INFO : Ignition 2.14.0 Apr 12 18:48:18.286353 ignition[838]: INFO : Stage: files Apr 12 18:48:18.286353 ignition[838]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:18.286353 ignition[838]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:18.286353 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:18.286353 ignition[838]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:48:18.286353 ignition[838]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:48:18.286353 ignition[838]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:48:18.286353 ignition[838]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:48:18.286353 ignition[838]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:48:18.286353 ignition[838]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:48:18.286353 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:48:18.286353 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:48:18.212800 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:48:18.264282 unknown[838]: wrote ssh authorized keys file for user: core Apr 12 18:48:18.311299 systemd-networkd[693]: eth0: Gained IPv6LL Apr 12 18:48:18.586387 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:48:18.838582 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:48:18.862267 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:48:18.862267 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:48:18.862267 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:48:18.932589 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:48:19.061192 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:48:19.088259 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (841) Apr 12 18:48:19.087468 systemd[1]: mnt-oem3430339929.mount: Deactivated successfully. Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3430339929" Apr 12 18:48:19.097332 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3430339929": device or resource busy Apr 12 18:48:19.097332 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3430339929", trying btrfs: device or resource busy Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3430339929" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3430339929" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem3430339929" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem3430339929" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:48:19.097332 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:48:19.301308 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Apr 12 18:48:19.380994 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:48:19.405265 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:48:19.405265 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:48:19.405265 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:48:19.462268 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Apr 12 18:48:19.725008 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2393578074" Apr 12 18:48:19.749270 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2393578074": device or resource busy Apr 12 18:48:19.749270 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2393578074", trying btrfs: device or resource busy Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2393578074" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2393578074" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem2393578074" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem2393578074" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:48:19.749270 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:48:19.738319 systemd[1]: mnt-oem2393578074.mount: Deactivated successfully. Apr 12 18:48:19.977455 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Apr 12 18:48:19.989299 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Apr 12 18:48:19.989299 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:48:19.989299 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:48:19.989299 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:48:20.059248 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Apr 12 18:48:20.482330 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:48:20.506259 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem412553129" Apr 12 18:48:20.951321 kernel: audit: type=1130 audit(1712947700.538:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.951489 kernel: audit: type=1130 audit(1712947700.623:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.951519 kernel: audit: type=1130 audit(1712947700.689:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.951534 kernel: audit: type=1131 audit(1712947700.689:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.951549 kernel: audit: type=1130 audit(1712947700.804:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.951563 kernel: audit: type=1131 audit(1712947700.804:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.502275 systemd[1]: mnt-oem412553129.mount: Deactivated successfully. Apr 12 18:48:20.989299 kernel: audit: type=1130 audit(1712947700.959:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.989464 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem412553129": device or resource busy Apr 12 18:48:20.989464 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem412553129", trying btrfs: device or resource busy Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem412553129" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem412553129" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem412553129" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem412553129" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3294920636" Apr 12 18:48:20.989464 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3294920636": device or resource busy Apr 12 18:48:20.989464 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3294920636", trying btrfs: device or resource busy Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3294920636" Apr 12 18:48:20.989464 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3294920636" Apr 12 18:48:21.318254 kernel: audit: type=1131 audit(1712947701.086:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.524364 systemd[1]: mnt-oem3294920636.mount: Deactivated successfully. Apr 12 18:48:21.334446 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem3294920636" Apr 12 18:48:21.334446 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem3294920636" Apr 12 18:48:21.334446 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(20): [started] processing unit "oem-gce.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Apr 12 18:48:21.334446 ignition[838]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:48:21.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.610000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.538799 systemd[1]: Finished ignition-files.service. Apr 12 18:48:21.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.728398 initrd-setup-root-after-ignition[861]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:48:21.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.749703 iscsid[703]: iscsid shutting down. Apr 12 18:48:21.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(28): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(28): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(29): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(29): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2a): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2a): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2b): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2b): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2c): [started] setting preset to enabled for "oem-gce.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2c): [finished] setting preset to enabled for "oem-gce.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2d): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: op(2d): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:48:21.765407 ignition[838]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:48:21.765407 ignition[838]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:48:21.765407 ignition[838]: INFO : files: files passed Apr 12 18:48:21.765407 ignition[838]: INFO : Ignition finished successfully Apr 12 18:48:21.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:21.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.549147 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:48:22.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.580399 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:48:22.139000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:48:20.581580 systemd[1]: Starting ignition-quench.service... Apr 12 18:48:20.603712 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:48:22.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.624869 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:48:22.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.625031 systemd[1]: Finished ignition-quench.service. Apr 12 18:48:22.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.690499 systemd[1]: Reached target ignition-complete.target. Apr 12 18:48:22.244273 ignition[876]: INFO : Ignition 2.14.0 Apr 12 18:48:22.244273 ignition[876]: INFO : Stage: umount Apr 12 18:48:22.244273 ignition[876]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:48:22.244273 ignition[876]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:48:22.244273 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:48:22.244273 ignition[876]: INFO : umount: umount passed Apr 12 18:48:22.244273 ignition[876]: INFO : Ignition finished successfully Apr 12 18:48:22.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.746395 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:48:20.802837 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:48:22.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.802958 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:48:22.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.805594 systemd[1]: Reached target initrd-fs.target. Apr 12 18:48:22.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:22.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:20.887287 systemd[1]: Reached target initrd.target. Apr 12 18:48:20.909334 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:48:20.910507 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:48:20.934596 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:48:20.961798 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:48:21.005024 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:48:21.015532 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:48:22.505272 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Apr 12 18:48:21.041705 systemd[1]: Stopped target timers.target. Apr 12 18:48:21.065688 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:48:21.065883 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:48:21.087782 systemd[1]: Stopped target initrd.target. Apr 12 18:48:21.148627 systemd[1]: Stopped target basic.target. Apr 12 18:48:21.189587 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:48:21.230577 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:48:21.277554 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:48:21.294570 systemd[1]: Stopped target remote-fs.target. Apr 12 18:48:21.326510 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:48:21.343571 systemd[1]: Stopped target sysinit.target. Apr 12 18:48:21.359602 systemd[1]: Stopped target local-fs.target. Apr 12 18:48:21.380556 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:48:21.422574 systemd[1]: Stopped target swap.target. Apr 12 18:48:21.435581 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:48:21.435771 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:48:21.469674 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:48:21.481590 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:48:21.481789 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:48:21.507670 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:48:21.507891 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:48:21.519628 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:48:21.519801 systemd[1]: Stopped ignition-files.service. Apr 12 18:48:21.545998 systemd[1]: Stopping ignition-mount.service... Apr 12 18:48:21.568805 systemd[1]: Stopping iscsid.service... Apr 12 18:48:21.592219 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:48:21.592491 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:48:21.612679 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:48:21.628394 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:48:21.628633 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:48:21.658513 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:48:21.658694 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:48:21.681207 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:48:21.682065 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:48:21.682204 systemd[1]: Stopped iscsid.service. Apr 12 18:48:21.695966 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:48:21.696075 systemd[1]: Stopped ignition-mount.service. Apr 12 18:48:21.722201 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:48:21.722322 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:48:21.736032 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:48:21.736244 systemd[1]: Stopped ignition-disks.service. Apr 12 18:48:21.758725 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:48:21.758807 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:48:21.773386 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:48:21.773456 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:48:21.798393 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:48:21.798469 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:48:21.817412 systemd[1]: Stopped target paths.target. Apr 12 18:48:21.837217 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:48:21.841185 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:48:21.857229 systemd[1]: Stopped target slices.target. Apr 12 18:48:21.875240 systemd[1]: Stopped target sockets.target. Apr 12 18:48:21.893330 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:48:21.893407 systemd[1]: Closed iscsid.socket. Apr 12 18:48:21.913307 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:48:21.913397 systemd[1]: Stopped ignition-setup.service. Apr 12 18:48:21.933359 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:48:21.933439 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:48:21.955466 systemd[1]: Stopping iscsiuio.service... Apr 12 18:48:21.976642 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:48:21.976770 systemd[1]: Stopped iscsiuio.service. Apr 12 18:48:21.995599 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:48:21.995713 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:48:22.016268 systemd[1]: Stopped target network.target. Apr 12 18:48:22.037272 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:48:22.037351 systemd[1]: Closed iscsiuio.socket. Apr 12 18:48:22.059516 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:48:22.063139 systemd-networkd[693]: eth0: DHCPv6 lease lost Apr 12 18:48:22.074555 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:48:22.095674 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:48:22.095799 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:48:22.109043 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:48:22.109199 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:48:22.130994 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:48:22.131046 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:48:22.150473 systemd[1]: Stopping network-cleanup.service... Apr 12 18:48:22.174271 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:48:22.174414 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:48:22.189542 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:48:22.189617 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:48:22.206471 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:48:22.206537 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:48:22.222445 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:48:22.237898 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:48:22.238704 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:48:22.238857 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:48:22.254096 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:48:22.254176 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:48:22.268254 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:48:22.268319 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:48:22.283256 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:48:22.283340 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:48:22.302354 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:48:22.302423 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:48:22.329345 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:48:22.516000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:48:22.329421 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:48:22.349329 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:48:22.371296 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:48:22.371415 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:48:22.387934 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:48:22.388055 systemd[1]: Stopped network-cleanup.service. Apr 12 18:48:22.403692 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:48:22.403806 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:48:22.419621 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:48:22.436654 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:48:22.470653 systemd[1]: Switching root. Apr 12 18:48:22.518871 systemd-journald[189]: Journal stopped Apr 12 18:48:27.116274 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:48:27.116493 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:48:27.116529 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:48:27.116563 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:48:27.116598 kernel: SELinux: policy capability open_perms=1 Apr 12 18:48:27.116629 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:48:27.116751 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:48:27.116778 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:48:27.116802 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:48:27.116830 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:48:27.116853 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:48:27.116884 systemd[1]: Successfully loaded SELinux policy in 111.156ms. Apr 12 18:48:27.116918 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.208ms. Apr 12 18:48:27.116944 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:48:27.116969 systemd[1]: Detected virtualization kvm. Apr 12 18:48:27.116993 systemd[1]: Detected architecture x86-64. Apr 12 18:48:27.117017 systemd[1]: Detected first boot. Apr 12 18:48:27.117042 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:48:27.117065 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:48:27.117121 kernel: kauditd_printk_skb: 41 callbacks suppressed Apr 12 18:48:27.117152 kernel: audit: type=1400 audit(1712947703.101:86): avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:48:27.117182 kernel: audit: type=1300 audit(1712947703.101:86): arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:27.117207 kernel: audit: type=1327 audit(1712947703.101:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:48:27.117230 kernel: audit: type=1400 audit(1712947703.111:87): avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:48:27.117254 kernel: audit: type=1300 audit(1712947703.111:87): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:27.117277 kernel: audit: type=1307 audit(1712947703.111:87): cwd="/" Apr 12 18:48:27.117302 kernel: audit: type=1302 audit(1712947703.111:87): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:27.117329 kernel: audit: type=1302 audit(1712947703.111:87): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:27.118028 kernel: audit: type=1327 audit(1712947703.111:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:48:27.118063 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:48:27.118112 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:48:27.118139 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:48:27.118166 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:48:27.118198 kernel: audit: type=1334 audit(1712947706.310:88): prog-id=12 op=LOAD Apr 12 18:48:27.118222 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:48:27.118247 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:48:27.118271 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:48:27.118296 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:48:27.118325 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:48:27.118351 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:48:27.118375 systemd[1]: Created slice system-getty.slice. Apr 12 18:48:27.118403 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:48:27.118428 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:48:27.118452 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:48:27.118477 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:48:27.118503 systemd[1]: Created slice user.slice. Apr 12 18:48:27.118527 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:48:27.118555 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:48:27.118588 systemd[1]: Set up automount boot.automount. Apr 12 18:48:27.118620 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:48:27.118646 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:48:27.118672 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:48:27.118696 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:48:27.118721 systemd[1]: Reached target integritysetup.target. Apr 12 18:48:27.118744 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:48:27.118768 systemd[1]: Reached target remote-fs.target. Apr 12 18:48:27.118793 systemd[1]: Reached target slices.target. Apr 12 18:48:27.118818 systemd[1]: Reached target swap.target. Apr 12 18:48:27.118846 systemd[1]: Reached target torcx.target. Apr 12 18:48:27.118870 systemd[1]: Reached target veritysetup.target. Apr 12 18:48:27.118895 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:48:27.118920 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:48:27.118944 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:48:27.118968 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:48:27.118996 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:48:27.119021 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:48:27.119045 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:48:27.119070 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:48:27.119125 systemd[1]: Mounting media.mount... Apr 12 18:48:27.119150 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:48:27.119172 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:48:27.119188 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:48:27.119207 systemd[1]: Mounting tmp.mount... Apr 12 18:48:27.119228 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:48:27.119253 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:48:27.119277 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:48:27.119301 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:48:27.119335 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:48:27.119350 systemd[1]: Starting modprobe@drm.service... Apr 12 18:48:27.119365 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:48:27.119380 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:48:27.119394 systemd[1]: Starting modprobe@loop.service... Apr 12 18:48:27.119409 kernel: fuse: init (API version 7.34) Apr 12 18:48:27.119424 kernel: loop: module loaded Apr 12 18:48:27.119438 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:48:27.119453 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:48:27.119471 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:48:27.119486 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:48:27.119500 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:48:27.119516 systemd[1]: Stopped systemd-journald.service. Apr 12 18:48:27.119540 systemd[1]: Starting systemd-journald.service... Apr 12 18:48:27.119558 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:48:27.119580 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:48:27.119599 systemd-journald[999]: Journal started Apr 12 18:48:27.119661 systemd-journald[999]: Runtime Journal (/run/log/journal/ac5b15dff0cf05e69311af63c1ffe2b4) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:48:22.816000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:48:22.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:48:22.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:48:22.952000 audit: BPF prog-id=10 op=LOAD Apr 12 18:48:22.952000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:48:22.952000 audit: BPF prog-id=11 op=LOAD Apr 12 18:48:22.952000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:48:23.101000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:48:23.101000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:23.101000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:48:23.111000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:48:23.111000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:23.111000 audit: CWD cwd="/" Apr 12 18:48:23.111000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:23.111000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:23.111000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:48:26.310000 audit: BPF prog-id=12 op=LOAD Apr 12 18:48:26.310000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:48:26.317000 audit: BPF prog-id=13 op=LOAD Apr 12 18:48:26.317000 audit: BPF prog-id=14 op=LOAD Apr 12 18:48:26.317000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:48:26.317000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:48:26.318000 audit: BPF prog-id=15 op=LOAD Apr 12 18:48:26.318000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:48:26.318000 audit: BPF prog-id=16 op=LOAD Apr 12 18:48:26.318000 audit: BPF prog-id=17 op=LOAD Apr 12 18:48:26.318000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:48:26.318000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:48:26.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:26.333000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:48:26.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:26.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.073000 audit: BPF prog-id=18 op=LOAD Apr 12 18:48:27.073000 audit: BPF prog-id=19 op=LOAD Apr 12 18:48:27.073000 audit: BPF prog-id=20 op=LOAD Apr 12 18:48:27.073000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:48:27.073000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:48:27.105000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:48:27.105000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffdbbeb3eb0 a2=4000 a3=7ffdbbeb3f4c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:27.105000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:48:23.098602 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:48:26.309285 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:48:23.099443 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:48:26.320772 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:48:23.099467 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:48:23.099507 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:48:23.099520 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:48:23.099560 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:48:23.099577 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:48:23.099812 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:48:23.099863 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:48:23.099879 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:48:23.101421 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:48:23.101467 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:48:23.101491 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:48:23.101510 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:48:23.101531 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:48:23.101549 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:23Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:48:25.712481 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:48:25.712782 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:48:25.712933 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:48:25.713220 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:48:25.713283 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:48:25.713355 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-04-12T18:48:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:48:27.130117 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:48:27.145125 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:48:27.160108 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:48:27.166126 systemd[1]: Stopped verity-setup.service. Apr 12 18:48:27.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.185115 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:48:27.194130 systemd[1]: Started systemd-journald.service. Apr 12 18:48:27.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.201559 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:48:27.208382 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:48:27.215404 systemd[1]: Mounted media.mount. Apr 12 18:48:27.223373 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:48:27.232357 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:48:27.241352 systemd[1]: Mounted tmp.mount. Apr 12 18:48:27.248440 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:48:27.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.257520 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:48:27.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.267515 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:48:27.267714 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:48:27.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.276591 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:48:27.276797 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:48:27.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.285573 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:48:27.285780 systemd[1]: Finished modprobe@drm.service. Apr 12 18:48:27.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.293000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.294557 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:48:27.294758 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:48:27.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.303533 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:48:27.303729 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:48:27.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.312524 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:48:27.312715 systemd[1]: Finished modprobe@loop.service. Apr 12 18:48:27.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.321736 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:48:27.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.331668 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:48:27.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.340847 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:48:27.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.349665 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:48:27.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.359036 systemd[1]: Reached target network-pre.target. Apr 12 18:48:27.369009 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:48:27.379603 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:48:27.386212 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:48:27.388721 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:48:27.397603 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:48:27.406894 systemd-journald[999]: Time spent on flushing to /var/log/journal/ac5b15dff0cf05e69311af63c1ffe2b4 is 76.776ms for 1183 entries. Apr 12 18:48:27.406894 systemd-journald[999]: System Journal (/var/log/journal/ac5b15dff0cf05e69311af63c1ffe2b4) is 8.0M, max 584.8M, 576.8M free. Apr 12 18:48:27.512536 systemd-journald[999]: Received client request to flush runtime journal. Apr 12 18:48:27.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:27.415275 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:48:27.417118 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:48:27.424268 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:48:27.425956 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:48:27.515381 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:48:27.434818 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:48:27.443743 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:48:27.454598 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:48:27.463337 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:48:27.471553 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:48:27.480584 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:48:27.492797 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:48:27.501728 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:48:27.513852 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:48:27.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.114774 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:48:28.151015 kernel: kauditd_printk_skb: 51 callbacks suppressed Apr 12 18:48:28.151231 kernel: audit: type=1130 audit(1712947708.122:138): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.149000 audit: BPF prog-id=21 op=LOAD Apr 12 18:48:28.152270 systemd[1]: Starting systemd-udevd.service... Apr 12 18:48:28.150000 audit: BPF prog-id=22 op=LOAD Apr 12 18:48:28.150000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:48:28.150000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:48:28.159206 kernel: audit: type=1334 audit(1712947708.149:139): prog-id=21 op=LOAD Apr 12 18:48:28.159282 kernel: audit: type=1334 audit(1712947708.150:140): prog-id=22 op=LOAD Apr 12 18:48:28.159322 kernel: audit: type=1334 audit(1712947708.150:141): prog-id=7 op=UNLOAD Apr 12 18:48:28.159360 kernel: audit: type=1334 audit(1712947708.150:142): prog-id=8 op=UNLOAD Apr 12 18:48:28.199174 systemd-udevd[1017]: Using default interface naming scheme 'v252'. Apr 12 18:48:28.240427 systemd[1]: Started systemd-udevd.service. Apr 12 18:48:28.276575 kernel: audit: type=1130 audit(1712947708.248:143): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.276460 systemd[1]: Starting systemd-networkd.service... Apr 12 18:48:28.290999 kernel: audit: type=1334 audit(1712947708.274:144): prog-id=23 op=LOAD Apr 12 18:48:28.274000 audit: BPF prog-id=23 op=LOAD Apr 12 18:48:28.296000 audit: BPF prog-id=24 op=LOAD Apr 12 18:48:28.305115 kernel: audit: type=1334 audit(1712947708.296:145): prog-id=24 op=LOAD Apr 12 18:48:28.305000 audit: BPF prog-id=25 op=LOAD Apr 12 18:48:28.314364 kernel: audit: type=1334 audit(1712947708.305:146): prog-id=25 op=LOAD Apr 12 18:48:28.314418 kernel: audit: type=1334 audit(1712947708.305:147): prog-id=26 op=LOAD Apr 12 18:48:28.305000 audit: BPF prog-id=26 op=LOAD Apr 12 18:48:28.316999 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:48:28.345551 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:48:28.392211 systemd[1]: Started systemd-userdbd.service. Apr 12 18:48:28.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.439128 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:48:28.502000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:48:28.502000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5562de0878e0 a1=32194 a2=7fd1200b9bc5 a3=5 items=108 ppid=1017 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:28.502000 audit: CWD cwd="/" Apr 12 18:48:28.502000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=1 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=2 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=3 name=(null) inode=14545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=4 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=5 name=(null) inode=14546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=6 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=7 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=8 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=9 name=(null) inode=14548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=10 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=11 name=(null) inode=14549 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=12 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=13 name=(null) inode=14550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=14 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=15 name=(null) inode=14551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=16 name=(null) inode=14547 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=17 name=(null) inode=14552 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=18 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=19 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=20 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=21 name=(null) inode=14554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=22 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=23 name=(null) inode=14555 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=24 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=25 name=(null) inode=14556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=26 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=27 name=(null) inode=14557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=28 name=(null) inode=14553 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=29 name=(null) inode=14558 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=30 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=31 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=32 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=33 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=34 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=35 name=(null) inode=14561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=36 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=37 name=(null) inode=14562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=38 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=39 name=(null) inode=14563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=40 name=(null) inode=14559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=41 name=(null) inode=14564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=42 name=(null) inode=14544 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=43 name=(null) inode=14565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=44 name=(null) inode=14565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=45 name=(null) inode=14566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=46 name=(null) inode=14565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=47 name=(null) inode=14567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=48 name=(null) inode=14565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=49 name=(null) inode=14568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=50 name=(null) inode=14565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=51 name=(null) inode=14569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=52 name=(null) inode=14565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=53 name=(null) inode=14570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=55 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=56 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=57 name=(null) inode=14572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=58 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=59 name=(null) inode=14573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=60 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=61 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=62 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=63 name=(null) inode=14575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=64 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=65 name=(null) inode=14576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=66 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=67 name=(null) inode=14577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=68 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=69 name=(null) inode=14578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=70 name=(null) inode=14574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=71 name=(null) inode=14579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=72 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=73 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=74 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=75 name=(null) inode=14581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=76 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=77 name=(null) inode=14582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=78 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=79 name=(null) inode=14583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=80 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=81 name=(null) inode=14584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=82 name=(null) inode=14580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=83 name=(null) inode=14585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=84 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=85 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=86 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=87 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=88 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=89 name=(null) inode=14588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=90 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=91 name=(null) inode=14589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=92 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=93 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=94 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=95 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=96 name=(null) inode=14571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=97 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=98 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=99 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=100 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=101 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=102 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=103 name=(null) inode=14595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=104 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=105 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=106 name=(null) inode=14592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.502000 audit: PATH item=107 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:48:28.527670 systemd-networkd[1034]: lo: Link UP Apr 12 18:48:28.527679 systemd-networkd[1034]: lo: Gained carrier Apr 12 18:48:28.528495 systemd-networkd[1034]: Enumeration completed Apr 12 18:48:28.528639 systemd[1]: Started systemd-networkd.service. Apr 12 18:48:28.529387 systemd-networkd[1034]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:48:28.531506 systemd-networkd[1034]: eth0: Link UP Apr 12 18:48:28.531514 systemd-networkd[1034]: eth0: Gained carrier Apr 12 18:48:28.502000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:48:28.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.541309 systemd-networkd[1034]: eth0: DHCPv4 address 10.128.0.18/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:48:28.571223 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:48:28.586221 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Apr 12 18:48:28.605124 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1044) Apr 12 18:48:28.619692 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:48:28.636120 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:48:28.650166 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input4 Apr 12 18:48:28.667140 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 18:48:28.667925 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:48:28.677116 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:48:28.691437 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:48:28.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.701737 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:48:28.729915 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:48:28.759475 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:48:28.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.768428 systemd[1]: Reached target cryptsetup.target. Apr 12 18:48:28.779643 systemd[1]: Starting lvm2-activation.service... Apr 12 18:48:28.785821 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:48:28.811483 systemd[1]: Finished lvm2-activation.service. Apr 12 18:48:28.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.820488 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:48:28.829209 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:48:28.829266 systemd[1]: Reached target local-fs.target. Apr 12 18:48:28.837190 systemd[1]: Reached target machines.target. Apr 12 18:48:28.846750 systemd[1]: Starting ldconfig.service... Apr 12 18:48:28.855688 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:48:28.855780 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:48:28.857281 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:48:28.866370 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:48:28.878054 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:48:28.878554 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:48:28.878657 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:48:28.880409 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:48:28.881232 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) Apr 12 18:48:28.884753 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:48:28.909800 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:48:28.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:28.928920 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:48:28.939803 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:48:28.953601 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:48:29.045313 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Apr 12 18:48:29.045313 systemd-fsck[1066]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 18:48:29.051487 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:48:29.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.066301 systemd[1]: Mounting boot.mount... Apr 12 18:48:29.101654 systemd[1]: Mounted boot.mount. Apr 12 18:48:29.131689 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:48:29.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.234020 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:48:29.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.244224 systemd[1]: Starting audit-rules.service... Apr 12 18:48:29.253008 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:48:29.262926 systemd[1]: Starting oem-gce-enable-oslogin.service... Apr 12 18:48:29.271187 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:48:29.280000 audit: BPF prog-id=27 op=LOAD Apr 12 18:48:29.283739 systemd[1]: Starting systemd-resolved.service... Apr 12 18:48:29.291000 audit: BPF prog-id=28 op=LOAD Apr 12 18:48:29.293982 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:48:29.301402 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:48:29.310316 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:48:29.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.319000 audit[1088]: SYSTEM_BOOT pid=1088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.323367 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:48:29.325488 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Apr 12 18:48:29.325720 systemd[1]: Finished oem-gce-enable-oslogin.service. Apr 12 18:48:29.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.341861 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:48:29.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.391138 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:48:29.400000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:48:29.400000 audit[1099]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffff2887820 a2=420 a3=0 items=0 ppid=1069 pid=1099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:29.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:29.400000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:48:29.401893 augenrules[1099]: No rules Apr 12 18:48:29.402430 systemd[1]: Finished audit-rules.service. Apr 12 18:48:29.474393 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:48:29.476206 systemd-timesyncd[1085]: Contacted time server 169.254.169.254:123 (169.254.169.254). Apr 12 18:48:29.476286 systemd-timesyncd[1085]: Initial clock synchronization to Fri 2024-04-12 18:48:29.664884 UTC. Apr 12 18:48:29.483458 systemd[1]: Reached target time-set.target. Apr 12 18:48:29.485887 systemd-resolved[1081]: Positive Trust Anchors: Apr 12 18:48:29.485925 systemd-resolved[1081]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:48:29.485979 systemd-resolved[1081]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:48:29.519137 systemd-resolved[1081]: Defaulting to hostname 'linux'. Apr 12 18:48:29.522048 systemd[1]: Started systemd-resolved.service. Apr 12 18:48:29.530303 systemd[1]: Reached target network.target. Apr 12 18:48:29.539227 systemd[1]: Reached target nss-lookup.target. Apr 12 18:48:29.567760 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:48:30.000039 systemd[1]: Finished ldconfig.service. Apr 12 18:48:30.009080 systemd[1]: Starting systemd-update-done.service... Apr 12 18:48:30.020269 systemd[1]: Finished systemd-update-done.service. Apr 12 18:48:30.023236 systemd-networkd[1034]: eth0: Gained IPv6LL Apr 12 18:48:30.030752 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:48:30.031557 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:48:30.040451 systemd[1]: Reached target sysinit.target. Apr 12 18:48:30.049403 systemd[1]: Started motdgen.path. Apr 12 18:48:30.056321 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:48:30.066489 systemd[1]: Started logrotate.timer. Apr 12 18:48:30.073363 systemd[1]: Started mdadm.timer. Apr 12 18:48:30.080242 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:48:30.089345 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:48:30.089415 systemd[1]: Reached target paths.target. Apr 12 18:48:30.096303 systemd[1]: Reached target timers.target. Apr 12 18:48:30.103717 systemd[1]: Listening on dbus.socket. Apr 12 18:48:30.112531 systemd[1]: Starting docker.socket... Apr 12 18:48:30.122657 systemd[1]: Listening on sshd.socket. Apr 12 18:48:30.130391 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:48:30.131097 systemd[1]: Listening on docker.socket. Apr 12 18:48:30.138376 systemd[1]: Reached target sockets.target. Apr 12 18:48:30.147284 systemd[1]: Reached target basic.target. Apr 12 18:48:30.154288 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:48:30.154343 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:48:30.155899 systemd[1]: Starting containerd.service... Apr 12 18:48:30.164565 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:48:30.175443 systemd[1]: Starting dbus.service... Apr 12 18:48:30.185152 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:48:30.194294 systemd[1]: Starting extend-filesystems.service... Apr 12 18:48:30.201256 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:48:30.203103 systemd[1]: Starting motdgen.service... Apr 12 18:48:30.210073 systemd[1]: Starting oem-gce.service... Apr 12 18:48:30.216639 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:48:30.218929 jq[1116]: false Apr 12 18:48:30.226396 systemd[1]: Starting prepare-critools.service... Apr 12 18:48:30.236038 systemd[1]: Starting prepare-helm.service... Apr 12 18:48:30.245125 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:48:30.254084 systemd[1]: Starting sshd-keygen.service... Apr 12 18:48:30.264200 systemd[1]: Starting systemd-logind.service... Apr 12 18:48:30.272269 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:48:30.272381 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Apr 12 18:48:30.273161 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:48:30.274333 systemd[1]: Starting update-engine.service... Apr 12 18:48:30.275337 extend-filesystems[1118]: Found sda Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda1 Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda2 Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda3 Apr 12 18:48:30.331580 extend-filesystems[1118]: Found usr Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda4 Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda6 Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda7 Apr 12 18:48:30.331580 extend-filesystems[1118]: Found sda9 Apr 12 18:48:30.331580 extend-filesystems[1118]: Checking size of /dev/sda9 Apr 12 18:48:30.398201 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Apr 12 18:48:30.283263 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:48:30.398444 extend-filesystems[1118]: Resized partition /dev/sda9 Apr 12 18:48:30.411646 jq[1140]: true Apr 12 18:48:30.295655 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:48:30.414946 extend-filesystems[1158]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:48:30.295943 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:48:30.425214 tar[1145]: ./ Apr 12 18:48:30.425214 tar[1145]: ./loopback Apr 12 18:48:30.296606 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:48:30.296883 systemd[1]: Finished motdgen.service. Apr 12 18:48:30.311874 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:48:30.312425 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:48:30.427800 jq[1150]: true Apr 12 18:48:30.428263 mkfs.ext4[1152]: mke2fs 1.46.5 (30-Dec-2021) Apr 12 18:48:30.428263 mkfs.ext4[1152]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Apr 12 18:48:30.428263 mkfs.ext4[1152]: Creating filesystem with 262144 4k blocks and 65536 inodes Apr 12 18:48:30.428263 mkfs.ext4[1152]: Filesystem UUID: 7ac92a34-1109-4ea0-b051-909135348a30 Apr 12 18:48:30.428263 mkfs.ext4[1152]: Superblock backups stored on blocks: Apr 12 18:48:30.428263 mkfs.ext4[1152]: 32768, 98304, 163840, 229376 Apr 12 18:48:30.428263 mkfs.ext4[1152]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:48:30.428263 mkfs.ext4[1152]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:48:30.428263 mkfs.ext4[1152]: Creating journal (8192 blocks): done Apr 12 18:48:30.428263 mkfs.ext4[1152]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:48:30.436555 tar[1147]: linux-amd64/helm Apr 12 18:48:30.474286 dbus-daemon[1115]: [system] SELinux support is enabled Apr 12 18:48:30.476275 systemd[1]: Started dbus.service. Apr 12 18:48:30.479371 update_engine[1137]: I0412 18:48:30.478999 1137 main.cc:92] Flatcar Update Engine starting Apr 12 18:48:30.486938 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:48:30.515244 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Apr 12 18:48:30.515415 update_engine[1137]: I0412 18:48:30.512490 1137 update_check_scheduler.cc:74] Next update check in 7m28s Apr 12 18:48:30.497548 dbus-daemon[1115]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1034 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:48:30.515596 tar[1146]: crictl Apr 12 18:48:30.487011 systemd[1]: Reached target system-config.target. Apr 12 18:48:30.516080 umount[1167]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Apr 12 18:48:30.499346 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:48:30.499388 systemd[1]: Reached target user-config.target. Apr 12 18:48:30.516248 systemd[1]: Started update-engine.service. Apr 12 18:48:30.517751 extend-filesystems[1158]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 18:48:30.517751 extend-filesystems[1158]: old_desc_blocks = 1, new_desc_blocks = 2 Apr 12 18:48:30.517751 extend-filesystems[1158]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Apr 12 18:48:30.601328 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 18:48:30.518637 dbus-daemon[1115]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:48:30.601554 extend-filesystems[1118]: Resized filesystem in /dev/sda9 Apr 12 18:48:30.525796 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:48:30.610574 env[1151]: time="2024-04-12T18:48:30.603240734Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:48:30.618663 bash[1186]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:48:30.526022 systemd[1]: Finished extend-filesystems.service. Apr 12 18:48:30.549715 systemd[1]: Started locksmithd.service. Apr 12 18:48:30.573597 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:48:30.618441 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:48:30.636140 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:48:30.796077 tar[1145]: ./bandwidth Apr 12 18:48:30.821679 systemd-logind[1136]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:48:30.825960 systemd-logind[1136]: Watching system buttons on /dev/input/event3 (Sleep Button) Apr 12 18:48:30.826225 systemd-logind[1136]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:48:30.830345 systemd-logind[1136]: New seat seat0. Apr 12 18:48:30.836566 systemd[1]: Started systemd-logind.service. Apr 12 18:48:30.980016 env[1151]: time="2024-04-12T18:48:30.979958222Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:48:30.985339 env[1151]: time="2024-04-12T18:48:30.985298995Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:48:30.988621 env[1151]: time="2024-04-12T18:48:30.988570051Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:48:30.988797 env[1151]: time="2024-04-12T18:48:30.988769766Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:48:30.989218 env[1151]: time="2024-04-12T18:48:30.989185314Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:48:30.992290 env[1151]: time="2024-04-12T18:48:30.992254361Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:48:30.992431 env[1151]: time="2024-04-12T18:48:30.992406201Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:48:30.992537 env[1151]: time="2024-04-12T18:48:30.992516973Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:48:30.992755 env[1151]: time="2024-04-12T18:48:30.992733175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:48:30.993382 env[1151]: time="2024-04-12T18:48:30.993350000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:48:30.993763 env[1151]: time="2024-04-12T18:48:30.993726877Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:48:30.998316 coreos-metadata[1114]: Apr 12 18:48:30.998 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Apr 12 18:48:30.998749 env[1151]: time="2024-04-12T18:48:30.998717717Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:48:30.998951 env[1151]: time="2024-04-12T18:48:30.998924266Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:48:30.999067 env[1151]: time="2024-04-12T18:48:30.999044534Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:48:31.004319 coreos-metadata[1114]: Apr 12 18:48:31.004 INFO Fetch failed with 404: resource not found Apr 12 18:48:31.004437 coreos-metadata[1114]: Apr 12 18:48:31.004 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Apr 12 18:48:31.005380 coreos-metadata[1114]: Apr 12 18:48:31.005 INFO Fetch successful Apr 12 18:48:31.005380 coreos-metadata[1114]: Apr 12 18:48:31.005 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Apr 12 18:48:31.006164 coreos-metadata[1114]: Apr 12 18:48:31.006 INFO Fetch failed with 404: resource not found Apr 12 18:48:31.006272 coreos-metadata[1114]: Apr 12 18:48:31.006 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Apr 12 18:48:31.006472 env[1151]: time="2024-04-12T18:48:31.006438219Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:48:31.006631 env[1151]: time="2024-04-12T18:48:31.006606641Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:48:31.006732 env[1151]: time="2024-04-12T18:48:31.006713890Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:48:31.006909 env[1151]: time="2024-04-12T18:48:31.006856417Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.007155 coreos-metadata[1114]: Apr 12 18:48:31.007 INFO Fetch failed with 404: resource not found Apr 12 18:48:31.007245 coreos-metadata[1114]: Apr 12 18:48:31.007 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Apr 12 18:48:31.007396 env[1151]: time="2024-04-12T18:48:31.007367966Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.007535 env[1151]: time="2024-04-12T18:48:31.007514661Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.007637 env[1151]: time="2024-04-12T18:48:31.007618656Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.007738 env[1151]: time="2024-04-12T18:48:31.007719780Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.007832 env[1151]: time="2024-04-12T18:48:31.007813916Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.008021 env[1151]: time="2024-04-12T18:48:31.007994784Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.008173 coreos-metadata[1114]: Apr 12 18:48:31.008 INFO Fetch successful Apr 12 18:48:31.008245 env[1151]: time="2024-04-12T18:48:31.008172203Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.008245 env[1151]: time="2024-04-12T18:48:31.008202004Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:48:31.008516 env[1151]: time="2024-04-12T18:48:31.008350635Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:48:31.008516 env[1151]: time="2024-04-12T18:48:31.008489128Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:48:31.009136 env[1151]: time="2024-04-12T18:48:31.009100776Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:48:31.009236 env[1151]: time="2024-04-12T18:48:31.009155399Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009236 env[1151]: time="2024-04-12T18:48:31.009180208Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:48:31.009347 env[1151]: time="2024-04-12T18:48:31.009271855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009347 env[1151]: time="2024-04-12T18:48:31.009297957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009459 env[1151]: time="2024-04-12T18:48:31.009402942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009459 env[1151]: time="2024-04-12T18:48:31.009426986Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009459 env[1151]: time="2024-04-12T18:48:31.009450443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009617 env[1151]: time="2024-04-12T18:48:31.009472354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009617 env[1151]: time="2024-04-12T18:48:31.009495524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009617 env[1151]: time="2024-04-12T18:48:31.009517698Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009617 env[1151]: time="2024-04-12T18:48:31.009552117Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:48:31.009827 env[1151]: time="2024-04-12T18:48:31.009743593Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009827 env[1151]: time="2024-04-12T18:48:31.009770353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009827 env[1151]: time="2024-04-12T18:48:31.009792187Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.009827 env[1151]: time="2024-04-12T18:48:31.009814348Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:48:31.010024 env[1151]: time="2024-04-12T18:48:31.009839332Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:48:31.010024 env[1151]: time="2024-04-12T18:48:31.009859903Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:48:31.010024 env[1151]: time="2024-04-12T18:48:31.009887810Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:48:31.010024 env[1151]: time="2024-04-12T18:48:31.009939816Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:48:31.012171 unknown[1114]: wrote ssh authorized keys file for user: core Apr 12 18:48:31.024982 env[1151]: time="2024-04-12T18:48:31.024869509Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.024992196Z" level=info msg="Connect containerd service" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.025060759Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.025967588Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.026364989Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.026431137Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.026495372Z" level=info msg="containerd successfully booted in 0.425956s" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.026871719Z" level=info msg="Start subscribing containerd event" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.026959612Z" level=info msg="Start recovering state" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.027061427Z" level=info msg="Start event monitor" Apr 12 18:48:31.029191 env[1151]: time="2024-04-12T18:48:31.027092111Z" level=info msg="Start snapshots syncer" Apr 12 18:48:31.026892 systemd[1]: Started containerd.service. Apr 12 18:48:31.035533 update-ssh-keys[1194]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:48:31.036208 env[1151]: time="2024-04-12T18:48:31.035870761Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:48:31.036208 env[1151]: time="2024-04-12T18:48:31.035926295Z" level=info msg="Start streaming server" Apr 12 18:48:31.036718 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:48:31.155120 dbus-daemon[1115]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:48:31.155327 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:48:31.161556 dbus-daemon[1115]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1188 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:48:31.162702 tar[1145]: ./ptp Apr 12 18:48:31.168931 systemd[1]: Starting polkit.service... Apr 12 18:48:31.232532 polkitd[1196]: Started polkitd version 121 Apr 12 18:48:31.252905 polkitd[1196]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:48:31.253239 polkitd[1196]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:48:31.255029 polkitd[1196]: Finished loading, compiling and executing 2 rules Apr 12 18:48:31.255759 dbus-daemon[1115]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:48:31.255975 systemd[1]: Started polkit.service. Apr 12 18:48:31.257161 polkitd[1196]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:48:31.276678 systemd-hostnamed[1188]: Hostname set to (transient) Apr 12 18:48:31.279475 systemd-resolved[1081]: System hostname changed to 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal'. Apr 12 18:48:31.387568 tar[1145]: ./vlan Apr 12 18:48:31.566511 tar[1145]: ./host-device Apr 12 18:48:31.731028 tar[1145]: ./tuning Apr 12 18:48:31.865269 tar[1145]: ./vrf Apr 12 18:48:32.013132 tar[1145]: ./sbr Apr 12 18:48:32.163579 tar[1145]: ./tap Apr 12 18:48:32.330144 tar[1145]: ./dhcp Apr 12 18:48:32.744126 tar[1145]: ./static Apr 12 18:48:32.752711 tar[1147]: linux-amd64/LICENSE Apr 12 18:48:32.752711 tar[1147]: linux-amd64/README.md Apr 12 18:48:32.767614 systemd[1]: Finished prepare-helm.service. Apr 12 18:48:32.834404 tar[1145]: ./firewall Apr 12 18:48:32.838494 systemd[1]: Finished prepare-critools.service. Apr 12 18:48:32.897623 tar[1145]: ./macvlan Apr 12 18:48:32.977957 tar[1145]: ./dummy Apr 12 18:48:33.084268 tar[1145]: ./bridge Apr 12 18:48:33.207130 tar[1145]: ./ipvlan Apr 12 18:48:33.319688 tar[1145]: ./portmap Apr 12 18:48:33.423604 tar[1145]: ./host-local Apr 12 18:48:33.537669 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:48:34.320628 sshd_keygen[1162]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:48:34.368487 systemd[1]: Finished sshd-keygen.service. Apr 12 18:48:34.377625 systemd[1]: Starting issuegen.service... Apr 12 18:48:34.389540 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:48:34.389785 systemd[1]: Finished issuegen.service. Apr 12 18:48:34.399403 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:48:34.411403 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:48:34.423985 systemd[1]: Started getty@tty1.service. Apr 12 18:48:34.434734 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:48:34.444576 systemd[1]: Reached target getty.target. Apr 12 18:48:34.448725 locksmithd[1183]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:48:36.587266 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Apr 12 18:48:38.577180 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 18:48:38.610639 systemd-nspawn[1225]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Apr 12 18:48:38.610639 systemd-nspawn[1225]: Press ^] three times within 1s to kill container. Apr 12 18:48:38.625141 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:48:38.713594 systemd[1]: Started oem-gce.service. Apr 12 18:48:38.721903 systemd[1]: Reached target multi-user.target. Apr 12 18:48:38.734307 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:48:38.747780 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:48:38.748036 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:48:38.759486 systemd[1]: Startup finished in 995ms (kernel) + 8.896s (initrd) + 16.071s (userspace) = 25.963s. Apr 12 18:48:38.807508 systemd-nspawn[1225]: + '[' -e /etc/default/instance_configs.cfg.template ']' Apr 12 18:48:38.807763 systemd-nspawn[1225]: + echo -e '[InstanceSetup]\nset_host_keys = false' Apr 12 18:48:38.807763 systemd-nspawn[1225]: + /usr/bin/google_instance_setup Apr 12 18:48:39.457291 instance-setup[1231]: INFO Running google_set_multiqueue. Apr 12 18:48:39.473728 instance-setup[1231]: INFO Set channels for eth0 to 2. Apr 12 18:48:39.477064 instance-setup[1231]: INFO Setting /proc/irq/27/smp_affinity_list to 0 for device virtio1. Apr 12 18:48:39.478493 instance-setup[1231]: INFO /proc/irq/27/smp_affinity_list: real affinity 0 Apr 12 18:48:39.478985 instance-setup[1231]: INFO Setting /proc/irq/28/smp_affinity_list to 0 for device virtio1. Apr 12 18:48:39.480488 instance-setup[1231]: INFO /proc/irq/28/smp_affinity_list: real affinity 0 Apr 12 18:48:39.480851 instance-setup[1231]: INFO Setting /proc/irq/29/smp_affinity_list to 1 for device virtio1. Apr 12 18:48:39.482230 instance-setup[1231]: INFO /proc/irq/29/smp_affinity_list: real affinity 1 Apr 12 18:48:39.482799 instance-setup[1231]: INFO Setting /proc/irq/30/smp_affinity_list to 1 for device virtio1. Apr 12 18:48:39.484281 instance-setup[1231]: INFO /proc/irq/30/smp_affinity_list: real affinity 1 Apr 12 18:48:39.491341 systemd[1]: Created slice system-sshd.slice. Apr 12 18:48:39.493640 systemd[1]: Started sshd@0-10.128.0.18:22-139.178.89.65:36268.service. Apr 12 18:48:39.505509 instance-setup[1231]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Apr 12 18:48:39.505692 instance-setup[1231]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Apr 12 18:48:39.556798 systemd-nspawn[1225]: + /usr/bin/google_metadata_script_runner --script-type startup Apr 12 18:48:39.869077 sshd[1258]: Accepted publickey for core from 139.178.89.65 port 36268 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:39.871669 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:39.890847 systemd[1]: Created slice user-500.slice. Apr 12 18:48:39.894869 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:48:39.906867 systemd-logind[1136]: New session 1 of user core. Apr 12 18:48:39.913393 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:48:39.915785 systemd[1]: Starting user@500.service... Apr 12 18:48:39.933833 (systemd)[1269]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:39.935237 startup-script[1265]: INFO Starting startup scripts. Apr 12 18:48:39.951836 startup-script[1265]: INFO No startup scripts found in metadata. Apr 12 18:48:39.952477 startup-script[1265]: INFO Finished running startup scripts. Apr 12 18:48:39.996363 systemd-nspawn[1225]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Apr 12 18:48:39.996363 systemd-nspawn[1225]: + daemon_pids=() Apr 12 18:48:39.996363 systemd-nspawn[1225]: + for d in accounts clock_skew network Apr 12 18:48:39.996363 systemd-nspawn[1225]: + daemon_pids+=($!) Apr 12 18:48:39.996363 systemd-nspawn[1225]: + for d in accounts clock_skew network Apr 12 18:48:39.996363 systemd-nspawn[1225]: + /usr/bin/google_accounts_daemon Apr 12 18:48:39.996363 systemd-nspawn[1225]: + daemon_pids+=($!) Apr 12 18:48:39.996363 systemd-nspawn[1225]: + for d in accounts clock_skew network Apr 12 18:48:39.996363 systemd-nspawn[1225]: + daemon_pids+=($!) Apr 12 18:48:39.996363 systemd-nspawn[1225]: + /usr/bin/google_network_daemon Apr 12 18:48:39.996363 systemd-nspawn[1225]: + NOTIFY_SOCKET=/run/systemd/notify Apr 12 18:48:39.997454 systemd-nspawn[1225]: + /usr/bin/systemd-notify --ready Apr 12 18:48:39.997454 systemd-nspawn[1225]: + /usr/bin/google_clock_skew_daemon Apr 12 18:48:40.060925 systemd-nspawn[1225]: + wait -n 36 37 38 Apr 12 18:48:40.095493 systemd[1269]: Queued start job for default target default.target. Apr 12 18:48:40.096382 systemd[1269]: Reached target paths.target. Apr 12 18:48:40.096417 systemd[1269]: Reached target sockets.target. Apr 12 18:48:40.096440 systemd[1269]: Reached target timers.target. Apr 12 18:48:40.096460 systemd[1269]: Reached target basic.target. Apr 12 18:48:40.096623 systemd[1]: Started user@500.service. Apr 12 18:48:40.098215 systemd[1]: Started session-1.scope. Apr 12 18:48:40.098921 systemd[1269]: Reached target default.target. Apr 12 18:48:40.098996 systemd[1269]: Startup finished in 154ms. Apr 12 18:48:40.362341 systemd[1]: Started sshd@1-10.128.0.18:22-139.178.89.65:36270.service. Apr 12 18:48:40.734557 sshd[1282]: Accepted publickey for core from 139.178.89.65 port 36270 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:40.736181 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:40.745149 systemd[1]: Started session-2.scope. Apr 12 18:48:40.747801 systemd-logind[1136]: New session 2 of user core. Apr 12 18:48:40.867398 groupadd[1291]: group added to /etc/group: name=google-sudoers, GID=1000 Apr 12 18:48:40.872554 groupadd[1291]: group added to /etc/gshadow: name=google-sudoers Apr 12 18:48:40.873051 google-clock-skew[1276]: INFO Starting Google Clock Skew daemon. Apr 12 18:48:40.888813 groupadd[1291]: new group: name=google-sudoers, GID=1000 Apr 12 18:48:40.892018 google-clock-skew[1276]: INFO Clock drift token has changed: 0. Apr 12 18:48:40.897831 systemd-nspawn[1225]: hwclock: Cannot access the Hardware Clock via any known method. Apr 12 18:48:40.898223 systemd-nspawn[1225]: hwclock: Use the --verbose option to see the details of our search for an access method. Apr 12 18:48:40.899309 google-clock-skew[1276]: WARNING Failed to sync system time with hardware clock. Apr 12 18:48:40.907869 google-accounts[1275]: INFO Starting Google Accounts daemon. Apr 12 18:48:40.915611 google-networking[1277]: INFO Starting Google Networking daemon. Apr 12 18:48:40.948333 google-accounts[1275]: WARNING OS Login not installed. Apr 12 18:48:40.949473 google-accounts[1275]: INFO Creating a new user account for 0. Apr 12 18:48:40.955229 systemd-nspawn[1225]: useradd: invalid user name '0': use --badname to ignore Apr 12 18:48:40.955991 google-accounts[1275]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Apr 12 18:48:40.994068 sshd[1282]: pam_unix(sshd:session): session closed for user core Apr 12 18:48:40.999047 systemd[1]: sshd@1-10.128.0.18:22-139.178.89.65:36270.service: Deactivated successfully. Apr 12 18:48:41.000209 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:48:41.001044 systemd-logind[1136]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:48:41.002568 systemd-logind[1136]: Removed session 2. Apr 12 18:48:41.048921 systemd[1]: Started sshd@2-10.128.0.18:22-139.178.89.65:36276.service. Apr 12 18:48:41.394622 sshd[1307]: Accepted publickey for core from 139.178.89.65 port 36276 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:41.396297 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:41.402947 systemd[1]: Started session-3.scope. Apr 12 18:48:41.403592 systemd-logind[1136]: New session 3 of user core. Apr 12 18:48:41.640201 sshd[1307]: pam_unix(sshd:session): session closed for user core Apr 12 18:48:41.644214 systemd[1]: sshd@2-10.128.0.18:22-139.178.89.65:36276.service: Deactivated successfully. Apr 12 18:48:41.645277 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:48:41.646357 systemd-logind[1136]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:48:41.647608 systemd-logind[1136]: Removed session 3. Apr 12 18:48:41.694938 systemd[1]: Started sshd@3-10.128.0.18:22-139.178.89.65:36282.service. Apr 12 18:48:42.037627 sshd[1313]: Accepted publickey for core from 139.178.89.65 port 36282 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:42.039572 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:42.046374 systemd[1]: Started session-4.scope. Apr 12 18:48:42.047378 systemd-logind[1136]: New session 4 of user core. Apr 12 18:48:42.287028 sshd[1313]: pam_unix(sshd:session): session closed for user core Apr 12 18:48:42.291231 systemd[1]: sshd@3-10.128.0.18:22-139.178.89.65:36282.service: Deactivated successfully. Apr 12 18:48:42.292288 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:48:42.293188 systemd-logind[1136]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:48:42.294482 systemd-logind[1136]: Removed session 4. Apr 12 18:48:42.342820 systemd[1]: Started sshd@4-10.128.0.18:22-139.178.89.65:36294.service. Apr 12 18:48:42.693308 sshd[1319]: Accepted publickey for core from 139.178.89.65 port 36294 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:42.694764 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:42.701394 systemd[1]: Started session-5.scope. Apr 12 18:48:42.702050 systemd-logind[1136]: New session 5 of user core. Apr 12 18:48:42.919185 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:48:42.919585 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:48:42.929330 dbus-daemon[1115]: \xd0\xfd\u0001\xcc1V: received setenforce notice (enforcing=-1434585392) Apr 12 18:48:42.931523 sudo[1322]: pam_unix(sudo:session): session closed for user root Apr 12 18:48:42.985436 sshd[1319]: pam_unix(sshd:session): session closed for user core Apr 12 18:48:42.990439 systemd[1]: sshd@4-10.128.0.18:22-139.178.89.65:36294.service: Deactivated successfully. Apr 12 18:48:42.991664 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:48:42.992674 systemd-logind[1136]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:48:42.994010 systemd-logind[1136]: Removed session 5. Apr 12 18:48:43.041457 systemd[1]: Started sshd@5-10.128.0.18:22-139.178.89.65:36304.service. Apr 12 18:48:43.391199 sshd[1326]: Accepted publickey for core from 139.178.89.65 port 36304 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:43.393506 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:43.400148 systemd[1]: Started session-6.scope. Apr 12 18:48:43.400799 systemd-logind[1136]: New session 6 of user core. Apr 12 18:48:43.598031 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:48:43.598469 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:48:43.602621 sudo[1330]: pam_unix(sudo:session): session closed for user root Apr 12 18:48:43.615495 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:48:43.615902 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:48:43.628834 systemd[1]: Stopping audit-rules.service... Apr 12 18:48:43.629000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:48:43.636290 kernel: kauditd_printk_skb: 132 callbacks suppressed Apr 12 18:48:43.636419 kernel: audit: type=1305 audit(1712947723.629:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:48:43.636463 auditctl[1333]: No rules Apr 12 18:48:43.637372 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:48:43.629000 audit[1333]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff53ba6700 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:43.637632 systemd[1]: Stopped audit-rules.service. Apr 12 18:48:43.653509 systemd[1]: Starting audit-rules.service... Apr 12 18:48:43.629000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:48:43.691498 augenrules[1350]: No rules Apr 12 18:48:43.691894 kernel: audit: type=1300 audit(1712947723.629:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff53ba6700 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:43.691964 kernel: audit: type=1327 audit(1712947723.629:167): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:48:43.692013 kernel: audit: type=1131 audit(1712947723.636:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.693220 systemd[1]: Finished audit-rules.service. Apr 12 18:48:43.694977 sudo[1329]: pam_unix(sudo:session): session closed for user root Apr 12 18:48:43.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.736002 kernel: audit: type=1130 audit(1712947723.691:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.736213 kernel: audit: type=1106 audit(1712947723.691:170): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.691000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.761404 kernel: audit: type=1104 audit(1712947723.691:171): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.691000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.751407 sshd[1326]: pam_unix(sshd:session): session closed for user core Apr 12 18:48:43.767521 systemd-logind[1136]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:48:43.769925 systemd[1]: sshd@5-10.128.0.18:22-139.178.89.65:36304.service: Deactivated successfully. Apr 12 18:48:43.771019 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:48:43.773139 systemd-logind[1136]: Removed session 6. Apr 12 18:48:43.760000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:43.813248 systemd[1]: Started sshd@6-10.128.0.18:22-139.178.89.65:36308.service. Apr 12 18:48:43.816534 kernel: audit: type=1106 audit(1712947723.760:172): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:43.840683 kernel: audit: type=1104 audit(1712947723.760:173): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:43.760000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:43.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.18:22-139.178.89.65:36304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.841297 kernel: audit: type=1131 audit(1712947723.765:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.18:22-139.178.89.65:36304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:43.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.18:22-139.178.89.65:36308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:44.164000 audit[1356]: USER_ACCT pid=1356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:44.165546 sshd[1356]: Accepted publickey for core from 139.178.89.65 port 36308 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:48:44.165000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:44.165000 audit[1356]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff898f9f40 a2=3 a3=0 items=0 ppid=1 pid=1356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:44.165000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:48:44.167436 sshd[1356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:48:44.173881 systemd[1]: Started session-7.scope. Apr 12 18:48:44.174688 systemd-logind[1136]: New session 7 of user core. Apr 12 18:48:44.180000 audit[1356]: USER_START pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:44.183000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:48:44.372000 audit[1359]: USER_ACCT pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:44.373508 sudo[1359]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:48:44.372000 audit[1359]: CRED_REFR pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:44.373967 sudo[1359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:48:44.375000 audit[1359]: USER_START pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:48:44.983865 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:48:44.992487 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:48:44.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:44.992973 systemd[1]: Reached target network-online.target. Apr 12 18:48:44.995870 systemd[1]: Starting docker.service... Apr 12 18:48:45.050133 env[1375]: time="2024-04-12T18:48:45.050021771Z" level=info msg="Starting up" Apr 12 18:48:45.052020 env[1375]: time="2024-04-12T18:48:45.051961275Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:48:45.052020 env[1375]: time="2024-04-12T18:48:45.051987744Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:48:45.052235 env[1375]: time="2024-04-12T18:48:45.052023560Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:48:45.052235 env[1375]: time="2024-04-12T18:48:45.052040631Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:48:45.054494 env[1375]: time="2024-04-12T18:48:45.054459594Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:48:45.054494 env[1375]: time="2024-04-12T18:48:45.054485470Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:48:45.054748 env[1375]: time="2024-04-12T18:48:45.054505556Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:48:45.054748 env[1375]: time="2024-04-12T18:48:45.054530405Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:48:45.063073 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3228259129-merged.mount: Deactivated successfully. Apr 12 18:48:45.102849 env[1375]: time="2024-04-12T18:48:45.102792526Z" level=info msg="Loading containers: start." Apr 12 18:48:45.182000 audit[1405]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.182000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffd6263f90 a2=0 a3=7fffd6263f7c items=0 ppid=1375 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:48:45.185000 audit[1407]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.185000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdd3d6a260 a2=0 a3=7ffdd3d6a24c items=0 ppid=1375 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:48:45.188000 audit[1409]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.188000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffca56f410 a2=0 a3=7fffca56f3fc items=0 ppid=1375 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:48:45.191000 audit[1411]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.191000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffedb62ef20 a2=0 a3=7ffedb62ef0c items=0 ppid=1375 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:48:45.196000 audit[1413]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.196000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea9961db0 a2=0 a3=7ffea9961d9c items=0 ppid=1375 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:48:45.216000 audit[1418]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.216000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffda97f9010 a2=0 a3=7ffda97f8ffc items=0 ppid=1375 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.216000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:48:45.226000 audit[1420]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.226000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff48ea6b60 a2=0 a3=7fff48ea6b4c items=0 ppid=1375 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:48:45.229000 audit[1422]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.229000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe5f667980 a2=0 a3=7ffe5f66796c items=0 ppid=1375 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:48:45.232000 audit[1424]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.232000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff0aaf1ca0 a2=0 a3=7fff0aaf1c8c items=0 ppid=1375 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.232000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:48:45.244000 audit[1428]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.244000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc1431b570 a2=0 a3=7ffc1431b55c items=0 ppid=1375 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:48:45.247000 audit[1429]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.247000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcdfb23780 a2=0 a3=7ffcdfb2376c items=0 ppid=1375 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:48:45.264124 kernel: Initializing XFRM netlink socket Apr 12 18:48:45.315499 env[1375]: time="2024-04-12T18:48:45.315437912Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:48:45.347000 audit[1437]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.347000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc8ae5f590 a2=0 a3=7ffc8ae5f57c items=0 ppid=1375 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:48:45.360000 audit[1440]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.360000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdf136ec90 a2=0 a3=7ffdf136ec7c items=0 ppid=1375 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:48:45.365000 audit[1443]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.365000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe744e3e70 a2=0 a3=7ffe744e3e5c items=0 ppid=1375 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:48:45.369000 audit[1445]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.369000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd9dcc1db0 a2=0 a3=7ffd9dcc1d9c items=0 ppid=1375 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.369000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:48:45.372000 audit[1447]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.372000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffee8d04690 a2=0 a3=7ffee8d0467c items=0 ppid=1375 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.372000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:48:45.375000 audit[1449]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.375000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff7769ee70 a2=0 a3=7fff7769ee5c items=0 ppid=1375 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.375000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:48:45.379000 audit[1451]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.379000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd3a455d90 a2=0 a3=7ffd3a455d7c items=0 ppid=1375 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.379000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:48:45.391000 audit[1454]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.391000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe952853c0 a2=0 a3=7ffe952853ac items=0 ppid=1375 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:48:45.395000 audit[1456]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.395000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc06c53eb0 a2=0 a3=7ffc06c53e9c items=0 ppid=1375 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:48:45.398000 audit[1458]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.398000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd045b7d00 a2=0 a3=7ffd045b7cec items=0 ppid=1375 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:48:45.401000 audit[1460]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.401000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff361aeff0 a2=0 a3=7fff361aefdc items=0 ppid=1375 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.401000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:48:45.402800 systemd-networkd[1034]: docker0: Link UP Apr 12 18:48:45.415000 audit[1464]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.415000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffee94e9cd0 a2=0 a3=7ffee94e9cbc items=0 ppid=1375 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.415000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:48:45.416000 audit[1465]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:48:45.416000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff892a2710 a2=0 a3=7fff892a26fc items=0 ppid=1375 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:48:45.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:48:45.418422 env[1375]: time="2024-04-12T18:48:45.418372247Z" level=info msg="Loading containers: done." Apr 12 18:48:45.437792 env[1375]: time="2024-04-12T18:48:45.437734031Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:48:45.438030 env[1375]: time="2024-04-12T18:48:45.437995351Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:48:45.438197 env[1375]: time="2024-04-12T18:48:45.438158386Z" level=info msg="Daemon has completed initialization" Apr 12 18:48:45.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:45.458510 systemd[1]: Started docker.service. Apr 12 18:48:45.471523 env[1375]: time="2024-04-12T18:48:45.471456766Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:48:45.495589 systemd[1]: Reloading. Apr 12 18:48:45.634950 /usr/lib/systemd/system-generators/torcx-generator[1514]: time="2024-04-12T18:48:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:48:45.635854 /usr/lib/systemd/system-generators/torcx-generator[1514]: time="2024-04-12T18:48:45Z" level=info msg="torcx already run" Apr 12 18:48:45.712647 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:48:45.712674 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:48:45.736264 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:48:45.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.829000 audit: BPF prog-id=37 op=LOAD Apr 12 18:48:45.830000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit: BPF prog-id=38 op=LOAD Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.832000 audit: BPF prog-id=39 op=LOAD Apr 12 18:48:45.832000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:48:45.832000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.834000 audit: BPF prog-id=40 op=LOAD Apr 12 18:48:45.834000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit: BPF prog-id=41 op=LOAD Apr 12 18:48:45.836000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit: BPF prog-id=42 op=LOAD Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.837000 audit: BPF prog-id=43 op=LOAD Apr 12 18:48:45.837000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:48:45.837000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit: BPF prog-id=44 op=LOAD Apr 12 18:48:45.839000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit: BPF prog-id=45 op=LOAD Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.839000 audit: BPF prog-id=46 op=LOAD Apr 12 18:48:45.839000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:48:45.839000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit: BPF prog-id=47 op=LOAD Apr 12 18:48:45.842000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.842000 audit: BPF prog-id=48 op=LOAD Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.843000 audit: BPF prog-id=49 op=LOAD Apr 12 18:48:45.843000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:48:45.843000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.844000 audit: BPF prog-id=50 op=LOAD Apr 12 18:48:45.844000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.846000 audit: BPF prog-id=51 op=LOAD Apr 12 18:48:45.846000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.847000 audit: BPF prog-id=52 op=LOAD Apr 12 18:48:45.848000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit: BPF prog-id=53 op=LOAD Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:48:45.848000 audit: BPF prog-id=54 op=LOAD Apr 12 18:48:45.848000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:48:45.848000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:48:45.884951 systemd[1]: Started kubelet.service. Apr 12 18:48:45.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:45.985130 kubelet[1554]: E0412 18:48:45.985038 1554 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:48:45.987170 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:48:45.987396 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:48:45.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:48:46.502891 env[1151]: time="2024-04-12T18:48:46.502819618Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\"" Apr 12 18:48:46.992154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount65452550.mount: Deactivated successfully. Apr 12 18:48:49.014922 env[1151]: time="2024-04-12T18:48:49.014839773Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:49.018485 env[1151]: time="2024-04-12T18:48:49.018387337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:49.022297 env[1151]: time="2024-04-12T18:48:49.022210419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:49.026077 env[1151]: time="2024-04-12T18:48:49.026011719Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cf0c29f585316888225cf254949988bdbedc7ba6238bc9a24bf6f0c508c42b6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:49.027884 env[1151]: time="2024-04-12T18:48:49.027796835Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\" returns image reference \"sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809\"" Apr 12 18:48:49.044860 env[1151]: time="2024-04-12T18:48:49.044794010Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\"" Apr 12 18:48:51.045489 env[1151]: time="2024-04-12T18:48:51.045414946Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:51.048074 env[1151]: time="2024-04-12T18:48:51.048012010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:51.050771 env[1151]: time="2024-04-12T18:48:51.050731128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:51.054037 env[1151]: time="2024-04-12T18:48:51.053995122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6caa3a4278e87169371d031861e49db21742bcbd8df650d7fe519a1a7f6764af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:51.055271 env[1151]: time="2024-04-12T18:48:51.055226654Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\" returns image reference \"sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7\"" Apr 12 18:48:51.069490 env[1151]: time="2024-04-12T18:48:51.069432286Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\"" Apr 12 18:48:52.351188 env[1151]: time="2024-04-12T18:48:52.351125761Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:52.355466 env[1151]: time="2024-04-12T18:48:52.355407513Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:52.358455 env[1151]: time="2024-04-12T18:48:52.358407542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:52.361276 env[1151]: time="2024-04-12T18:48:52.361226814Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b8bb7b17a4f915419575ceb885e128d0bb5ea8e67cb88dbde257988b770a4dce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:52.362426 env[1151]: time="2024-04-12T18:48:52.362365146Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\" returns image reference \"sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833\"" Apr 12 18:48:52.379806 env[1151]: time="2024-04-12T18:48:52.379719401Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:48:53.475067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2413253383.mount: Deactivated successfully. Apr 12 18:48:54.129448 env[1151]: time="2024-04-12T18:48:54.129367061Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.132133 env[1151]: time="2024-04-12T18:48:54.132061147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.134184 env[1151]: time="2024-04-12T18:48:54.134140695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.136150 env[1151]: time="2024-04-12T18:48:54.136112812Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.136748 env[1151]: time="2024-04-12T18:48:54.136689636Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\"" Apr 12 18:48:54.151277 env[1151]: time="2024-04-12T18:48:54.151219327Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:48:54.508861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2260122807.mount: Deactivated successfully. Apr 12 18:48:54.518523 env[1151]: time="2024-04-12T18:48:54.518456167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.520801 env[1151]: time="2024-04-12T18:48:54.520754276Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.522786 env[1151]: time="2024-04-12T18:48:54.522748597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.524646 env[1151]: time="2024-04-12T18:48:54.524610328Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:54.525353 env[1151]: time="2024-04-12T18:48:54.525305434Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:48:54.539974 env[1151]: time="2024-04-12T18:48:54.539914982Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Apr 12 18:48:55.246596 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2367606375.mount: Deactivated successfully. Apr 12 18:48:56.228908 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:48:56.229287 systemd[1]: Stopped kubelet.service. Apr 12 18:48:56.256127 kernel: kauditd_printk_skb: 293 callbacks suppressed Apr 12 18:48:56.256307 kernel: audit: type=1130 audit(1712947736.228:418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:56.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:56.231773 systemd[1]: Started kubelet.service. Apr 12 18:48:56.276377 kernel: audit: type=1131 audit(1712947736.228:419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:56.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:56.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:56.300697 kernel: audit: type=1130 audit(1712947736.229:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:48:56.326765 kubelet[1600]: E0412 18:48:56.326705 1600 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:48:56.332149 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:48:56.332368 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:48:56.354548 kernel: audit: type=1131 audit(1712947736.331:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:48:56.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:48:59.938024 env[1151]: time="2024-04-12T18:48:59.937944872Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:59.940708 env[1151]: time="2024-04-12T18:48:59.940661116Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:59.942981 env[1151]: time="2024-04-12T18:48:59.942928718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:59.945194 env[1151]: time="2024-04-12T18:48:59.945151448Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:48:59.946060 env[1151]: time="2024-04-12T18:48:59.946001162Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Apr 12 18:48:59.959880 env[1151]: time="2024-04-12T18:48:59.959820690Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:49:00.385775 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3444196560.mount: Deactivated successfully. Apr 12 18:49:01.139049 env[1151]: time="2024-04-12T18:49:01.138975263Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:01.141640 env[1151]: time="2024-04-12T18:49:01.141591120Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:01.143811 env[1151]: time="2024-04-12T18:49:01.143774473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:01.145985 env[1151]: time="2024-04-12T18:49:01.145946647Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:01.146719 env[1151]: time="2024-04-12T18:49:01.146675714Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 18:49:01.309234 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:49:01.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:01.332388 kernel: audit: type=1131 audit(1712947741.308:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:01.348000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:49:01.348000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:49:01.363642 kernel: audit: type=1334 audit(1712947741.348:423): prog-id=49 op=UNLOAD Apr 12 18:49:01.363768 kernel: audit: type=1334 audit(1712947741.348:424): prog-id=48 op=UNLOAD Apr 12 18:49:01.363812 kernel: audit: type=1334 audit(1712947741.348:425): prog-id=47 op=UNLOAD Apr 12 18:49:01.348000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:49:04.895840 systemd[1]: Stopped kubelet.service. Apr 12 18:49:04.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:04.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:04.926056 systemd[1]: Reloading. Apr 12 18:49:04.939181 kernel: audit: type=1130 audit(1712947744.895:426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:04.939311 kernel: audit: type=1131 audit(1712947744.895:427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:05.044019 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2024-04-12T18:49:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:49:05.047879 /usr/lib/systemd/system-generators/torcx-generator[1696]: time="2024-04-12T18:49:05Z" level=info msg="torcx already run" Apr 12 18:49:05.141230 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:49:05.141258 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:49:05.164850 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:49:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.300325 kernel: audit: type=1400 audit(1712947745.257:428): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.300472 kernel: audit: type=1400 audit(1712947745.257:429): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.321146 kernel: audit: type=1400 audit(1712947745.258:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.342217 kernel: audit: type=1400 audit(1712947745.258:431): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit: BPF prog-id=55 op=LOAD Apr 12 18:49:05.278000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit: BPF prog-id=56 op=LOAD Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit: BPF prog-id=57 op=LOAD Apr 12 18:49:05.299000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:49:05.299000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit: BPF prog-id=58 op=LOAD Apr 12 18:49:05.320000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit: BPF prog-id=59 op=LOAD Apr 12 18:49:05.341000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit: BPF prog-id=60 op=LOAD Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit: BPF prog-id=62 op=LOAD Apr 12 18:49:05.344000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit: BPF prog-id=63 op=LOAD Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.344000 audit: BPF prog-id=64 op=LOAD Apr 12 18:49:05.344000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:49:05.344000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.348000 audit: BPF prog-id=65 op=LOAD Apr 12 18:49:05.348000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.350000 audit: BPF prog-id=66 op=LOAD Apr 12 18:49:05.350000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit: BPF prog-id=67 op=LOAD Apr 12 18:49:05.352000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit: BPF prog-id=68 op=LOAD Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:05.352000 audit: BPF prog-id=69 op=LOAD Apr 12 18:49:05.352000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:49:05.352000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:49:05.374801 systemd[1]: Started kubelet.service. Apr 12 18:49:05.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:05.449795 kubelet[1740]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:49:05.449795 kubelet[1740]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:49:05.449795 kubelet[1740]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:49:05.450438 kubelet[1740]: I0412 18:49:05.449755 1740 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:49:06.048034 kubelet[1740]: I0412 18:49:06.047987 1740 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:49:06.048034 kubelet[1740]: I0412 18:49:06.048025 1740 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:49:06.048429 kubelet[1740]: I0412 18:49:06.048376 1740 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:49:06.055308 kubelet[1740]: E0412 18:49:06.055269 1740 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.18:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.055549 kubelet[1740]: I0412 18:49:06.055529 1740 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:49:06.061539 kubelet[1740]: I0412 18:49:06.061510 1740 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:49:06.062040 kubelet[1740]: I0412 18:49:06.062016 1740 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:49:06.062182 kubelet[1740]: I0412 18:49:06.062135 1740 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:49:06.062182 kubelet[1740]: I0412 18:49:06.062166 1740 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:49:06.062182 kubelet[1740]: I0412 18:49:06.062183 1740 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:49:06.062485 kubelet[1740]: I0412 18:49:06.062320 1740 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:49:06.070401 kubelet[1740]: I0412 18:49:06.070373 1740 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:49:06.070401 kubelet[1740]: I0412 18:49:06.070405 1740 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:49:06.070613 kubelet[1740]: I0412 18:49:06.070432 1740 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:49:06.070613 kubelet[1740]: I0412 18:49:06.070449 1740 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:49:06.071557 kubelet[1740]: I0412 18:49:06.071531 1740 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:49:06.073431 kubelet[1740]: W0412 18:49:06.073369 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.073548 kubelet[1740]: E0412 18:49:06.073459 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.074236 kubelet[1740]: W0412 18:49:06.074185 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.074326 kubelet[1740]: E0412 18:49:06.074248 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.074839 kubelet[1740]: W0412 18:49:06.074797 1740 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:49:06.075489 kubelet[1740]: I0412 18:49:06.075463 1740 server.go:1168] "Started kubelet" Apr 12 18:49:06.076000 audit[1740]: AVC avc: denied { mac_admin } for pid=1740 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:06.076000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:49:06.076000 audit[1740]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d501b0 a1=c0001b38c0 a2=c000d50150 a3=25 items=0 ppid=1 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.076000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:49:06.076000 audit[1740]: AVC avc: denied { mac_admin } for pid=1740 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:06.076000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:49:06.076000 audit[1740]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00049dec0 a1=c0001b38d8 a2=c000d50330 a3=25 items=0 ppid=1 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.076000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:49:06.078503 kubelet[1740]: I0412 18:49:06.077683 1740 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:49:06.078503 kubelet[1740]: I0412 18:49:06.077738 1740 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:49:06.078503 kubelet[1740]: I0412 18:49:06.077835 1740 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:49:06.079608 kubelet[1740]: E0412 18:49:06.079269 1740 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal.17c59ce643a1ef68", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", UID:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 49, 6, 75438952, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 49, 6, 75438952, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.18:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.18:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:49:06.080009 kubelet[1740]: E0412 18:49:06.079987 1740 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:49:06.080182 kubelet[1740]: E0412 18:49:06.080165 1740 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:49:06.083325 kubelet[1740]: I0412 18:49:06.083293 1740 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:49:06.082000 audit[1751]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.082000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcf0ebef40 a2=0 a3=7ffcf0ebef2c items=0 ppid=1740 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:49:06.084782 kubelet[1740]: I0412 18:49:06.084757 1740 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:49:06.084000 audit[1752]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.084000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffeb5dc5c0 a2=0 a3=7fffeb5dc5ac items=0 ppid=1740 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:49:06.087050 kubelet[1740]: I0412 18:49:06.087022 1740 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:49:06.087196 kubelet[1740]: I0412 18:49:06.087178 1740 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:49:06.088232 kubelet[1740]: E0412 18:49:06.088211 1740 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.18:6443: connect: connection refused" interval="200ms" Apr 12 18:49:06.089462 kubelet[1740]: I0412 18:49:06.089444 1740 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:49:06.089000 audit[1754]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.089000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffe229ba40 a2=0 a3=7fffe229ba2c items=0 ppid=1740 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:49:06.090986 kubelet[1740]: W0412 18:49:06.090933 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.091185 kubelet[1740]: E0412 18:49:06.091166 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.092000 audit[1756]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.092000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff98019730 a2=0 a3=7fff9801971c items=0 ppid=1740 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:49:06.117000 audit[1760]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.117000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc9c37efb0 a2=0 a3=7ffc9c37ef9c items=0 ppid=1740 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:49:06.119518 kubelet[1740]: I0412 18:49:06.119493 1740 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:49:06.121852 kubelet[1740]: I0412 18:49:06.121829 1740 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:49:06.121989 kubelet[1740]: I0412 18:49:06.121973 1740 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:49:06.122140 kubelet[1740]: I0412 18:49:06.122124 1740 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:49:06.121000 audit[1763]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:06.121000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd04e13c30 a2=0 a3=7ffd04e13c1c items=0 ppid=1740 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:49:06.123296 kubelet[1740]: I0412 18:49:06.123276 1740 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:49:06.123503 kubelet[1740]: I0412 18:49:06.123487 1740 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:49:06.123624 kubelet[1740]: I0412 18:49:06.123608 1740 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:49:06.123783 kubelet[1740]: E0412 18:49:06.123768 1740 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:49:06.124000 audit[1766]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:06.124000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff173e87c0 a2=0 a3=7fff173e87ac items=0 ppid=1740 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.124000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:49:06.126015 kubelet[1740]: W0412 18:49:06.125965 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.126122 kubelet[1740]: E0412 18:49:06.126031 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:06.126000 audit[1764]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.126000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc33751db0 a2=0 a3=7ffc33751d9c items=0 ppid=1740 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:49:06.127000 audit[1767]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:06.127000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd7faca8b0 a2=0 a3=7ffd7faca89c items=0 ppid=1740 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:49:06.128000 audit[1768]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.128000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff248e3780 a2=0 a3=7fff248e376c items=0 ppid=1740 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.128000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:49:06.129000 audit[1769]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:06.129000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd2baf9f30 a2=0 a3=7ffd2baf9f1c items=0 ppid=1740 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.129000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:49:06.131000 audit[1770]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:06.131000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5fa0e050 a2=0 a3=7fff5fa0e03c items=0 ppid=1740 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:49:06.136784 kubelet[1740]: I0412 18:49:06.136741 1740 policy_none.go:49] "None policy: Start" Apr 12 18:49:06.138075 kubelet[1740]: I0412 18:49:06.138035 1740 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:49:06.138075 kubelet[1740]: I0412 18:49:06.138065 1740 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:49:06.159919 systemd[1]: Created slice kubepods.slice. Apr 12 18:49:06.166892 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:49:06.170801 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:49:06.180994 kubelet[1740]: I0412 18:49:06.180943 1740 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:49:06.179000 audit[1740]: AVC avc: denied { mac_admin } for pid=1740 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:06.179000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:49:06.179000 audit[1740]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e70120 a1=c00100c858 a2=c000e700f0 a3=25 items=0 ppid=1 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:06.179000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:49:06.181505 kubelet[1740]: I0412 18:49:06.181051 1740 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:49:06.181505 kubelet[1740]: I0412 18:49:06.181383 1740 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:49:06.183204 kubelet[1740]: E0412 18:49:06.183138 1740 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:06.192574 kubelet[1740]: I0412 18:49:06.192523 1740 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.192943 kubelet[1740]: E0412 18:49:06.192923 1740 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.18:6443/api/v1/nodes\": dial tcp 10.128.0.18:6443: connect: connection refused" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.224069 kubelet[1740]: I0412 18:49:06.224022 1740 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:06.229527 kubelet[1740]: I0412 18:49:06.229501 1740 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:06.251294 kubelet[1740]: I0412 18:49:06.251268 1740 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:06.257817 systemd[1]: Created slice kubepods-burstable-pod931ba5b3328564bcff0fe57b6d56443f.slice. Apr 12 18:49:06.275635 systemd[1]: Created slice kubepods-burstable-pod58fc8f0ca4671d9f280e68f6b3985aba.slice. Apr 12 18:49:06.289724 kubelet[1740]: E0412 18:49:06.289098 1740 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.18:6443: connect: connection refused" interval="400ms" Apr 12 18:49:06.289485 systemd[1]: Created slice kubepods-burstable-podc83aaa89cf870c3c57382b1f10a64c8a.slice. Apr 12 18:49:06.293108 kubelet[1740]: I0412 18:49:06.293069 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c83aaa89cf870c3c57382b1f10a64c8a-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"c83aaa89cf870c3c57382b1f10a64c8a\") " pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293237 kubelet[1740]: I0412 18:49:06.293143 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293237 kubelet[1740]: I0412 18:49:06.293184 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293237 kubelet[1740]: I0412 18:49:06.293221 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/58fc8f0ca4671d9f280e68f6b3985aba-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"58fc8f0ca4671d9f280e68f6b3985aba\") " pod="kube-system/kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293404 kubelet[1740]: I0412 18:49:06.293257 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c83aaa89cf870c3c57382b1f10a64c8a-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"c83aaa89cf870c3c57382b1f10a64c8a\") " pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293404 kubelet[1740]: I0412 18:49:06.293296 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c83aaa89cf870c3c57382b1f10a64c8a-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"c83aaa89cf870c3c57382b1f10a64c8a\") " pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293404 kubelet[1740]: I0412 18:49:06.293336 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293404 kubelet[1740]: I0412 18:49:06.293396 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.293637 kubelet[1740]: I0412 18:49:06.293440 1740 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.399366 kubelet[1740]: I0412 18:49:06.399242 1740 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.399727 kubelet[1740]: E0412 18:49:06.399691 1740 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.18:6443/api/v1/nodes\": dial tcp 10.128.0.18:6443: connect: connection refused" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.566049 env[1151]: time="2024-04-12T18:49:06.565948944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal,Uid:931ba5b3328564bcff0fe57b6d56443f,Namespace:kube-system,Attempt:0,}" Apr 12 18:49:06.581001 env[1151]: time="2024-04-12T18:49:06.580929472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal,Uid:58fc8f0ca4671d9f280e68f6b3985aba,Namespace:kube-system,Attempt:0,}" Apr 12 18:49:06.593490 env[1151]: time="2024-04-12T18:49:06.593425404Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal,Uid:c83aaa89cf870c3c57382b1f10a64c8a,Namespace:kube-system,Attempt:0,}" Apr 12 18:49:06.647484 kubelet[1740]: E0412 18:49:06.647350 1740 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal.17c59ce643a1ef68", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", UID:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 49, 6, 75438952, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 49, 6, 75438952, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.128.0.18:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.18:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:49:06.691130 kubelet[1740]: E0412 18:49:06.690853 1740 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.18:6443: connect: connection refused" interval="800ms" Apr 12 18:49:06.806207 kubelet[1740]: I0412 18:49:06.806149 1740 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:06.806574 kubelet[1740]: E0412 18:49:06.806547 1740 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.18:6443/api/v1/nodes\": dial tcp 10.128.0.18:6443: connect: connection refused" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:07.187796 kubelet[1740]: W0412 18:49:07.187706 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.187796 kubelet[1740]: E0412 18:49:07.187791 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.323126 kubelet[1740]: W0412 18:49:07.323032 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.340807 kubelet[1740]: E0412 18:49:07.323138 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.351378 kubelet[1740]: W0412 18:49:07.351262 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.351378 kubelet[1740]: E0412 18:49:07.351349 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.554325 kubelet[1740]: E0412 18:49:07.491534 1740 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.18:6443: connect: connection refused" interval="1.6s" Apr 12 18:49:07.612432 kubelet[1740]: I0412 18:49:07.612383 1740 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:07.612822 kubelet[1740]: E0412 18:49:07.612765 1740 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.18:6443/api/v1/nodes\": dial tcp 10.128.0.18:6443: connect: connection refused" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:07.657532 kubelet[1740]: W0412 18:49:07.657431 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:07.657532 kubelet[1740]: E0412 18:49:07.657524 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:08.102769 kubelet[1740]: E0412 18:49:08.102677 1740 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.18:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.043489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1677056794.mount: Deactivated successfully. Apr 12 18:49:09.052464 env[1151]: time="2024-04-12T18:49:09.052413091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.054297 env[1151]: time="2024-04-12T18:49:09.054252708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.057905 env[1151]: time="2024-04-12T18:49:09.057865046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.059013 env[1151]: time="2024-04-12T18:49:09.058969637Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.060773 env[1151]: time="2024-04-12T18:49:09.060715670Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.063528 env[1151]: time="2024-04-12T18:49:09.063460096Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.064679 env[1151]: time="2024-04-12T18:49:09.064620657Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.066134 env[1151]: time="2024-04-12T18:49:09.066097948Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.068482 env[1151]: time="2024-04-12T18:49:09.068410865Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.070656 env[1151]: time="2024-04-12T18:49:09.070601149Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.072194 env[1151]: time="2024-04-12T18:49:09.072145027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.075701 env[1151]: time="2024-04-12T18:49:09.075642058Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:09.094995 kubelet[1740]: E0412 18:49:09.094929 1740 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.18:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.18:6443: connect: connection refused" interval="3.2s" Apr 12 18:49:09.107608 kubelet[1740]: W0412 18:49:09.107566 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.107768 kubelet[1740]: E0412 18:49:09.107639 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.18:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.125516 env[1151]: time="2024-04-12T18:49:09.125438274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:09.125772 env[1151]: time="2024-04-12T18:49:09.125730560Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:09.126031 env[1151]: time="2024-04-12T18:49:09.125992577Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:09.126637 env[1151]: time="2024-04-12T18:49:09.126567307Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7dac872fa549d26fca25b16ae255c93c89cade5e11d5d0074a8e7df5f68c1e6b pid=1785 runtime=io.containerd.runc.v2 Apr 12 18:49:09.128112 env[1151]: time="2024-04-12T18:49:09.128006391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:09.128267 env[1151]: time="2024-04-12T18:49:09.128062961Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:09.128267 env[1151]: time="2024-04-12T18:49:09.128127618Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:09.128428 env[1151]: time="2024-04-12T18:49:09.128378701Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1de053358b40a3143f2f4f2ba03e49393ef1b66420c5ae0ea4fffafc06473274 pid=1799 runtime=io.containerd.runc.v2 Apr 12 18:49:09.133389 env[1151]: time="2024-04-12T18:49:09.133302686Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:09.133630 env[1151]: time="2024-04-12T18:49:09.133567730Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:09.133806 env[1151]: time="2024-04-12T18:49:09.133766601Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:09.135841 env[1151]: time="2024-04-12T18:49:09.135773745Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b845abec8e10f80bca18dca95dbd99dbf6886ca15205726f67f7d7fe1e955d8 pid=1793 runtime=io.containerd.runc.v2 Apr 12 18:49:09.162363 systemd[1]: Started cri-containerd-6b845abec8e10f80bca18dca95dbd99dbf6886ca15205726f67f7d7fe1e955d8.scope. Apr 12 18:49:09.190298 systemd[1]: Started cri-containerd-7dac872fa549d26fca25b16ae255c93c89cade5e11d5d0074a8e7df5f68c1e6b.scope. Apr 12 18:49:09.201314 kubelet[1740]: W0412 18:49:09.201235 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.201561 kubelet[1740]: E0412 18:49:09.201329 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.18:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.215104 systemd[1]: Started cri-containerd-1de053358b40a3143f2f4f2ba03e49393ef1b66420c5ae0ea4fffafc06473274.scope. Apr 12 18:49:09.224722 kubelet[1740]: I0412 18:49:09.223976 1740 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:09.224722 kubelet[1740]: E0412 18:49:09.224649 1740 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.18:6443/api/v1/nodes\": dial tcp 10.128.0.18:6443: connect: connection refused" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:09.252417 kernel: kauditd_printk_skb: 233 callbacks suppressed Apr 12 18:49:09.252618 kernel: audit: type=1400 audit(1712947749.224:608): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.311114 kernel: audit: type=1400 audit(1712947749.224:609): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.311307 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:49:09.311348 kernel: audit: type=1400 audit(1712947749.224:610): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.311381 kernel: audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:49:09.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.343280 kernel: audit: type=1400 audit(1712947749.225:611): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.343447 kernel: audit: backlog limit exceeded Apr 12 18:49:09.343489 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:49:09.343524 kernel: audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:49:09.343567 kernel: audit: backlog limit exceeded Apr 12 18:49:09.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.252000 audit: BPF prog-id=70 op=LOAD Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1793 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383435616265633865313066383062636131386463613935646264 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1793 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383435616265633865313066383062636131386463613935646264 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit: BPF prog-id=71 op=LOAD Apr 12 18:49:09.253000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025190 items=0 ppid=1793 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383435616265633865313066383062636131386463613935646264 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit: BPF prog-id=72 op=LOAD Apr 12 18:49:09.253000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251d8 items=0 ppid=1793 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383435616265633865313066383062636131386463613935646264 Apr 12 18:49:09.253000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:49:09.253000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.253000 audit: BPF prog-id=73 op=LOAD Apr 12 18:49:09.253000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000255e8 items=0 ppid=1793 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662383435616265633865313066383062636131386463613935646264 Apr 12 18:49:09.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.361000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.362000 audit: BPF prog-id=75 op=LOAD Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764616338373266613534396432366663613235623136616532353563 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764616338373266613534396432366663613235623136616532353563 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit: BPF prog-id=76 op=LOAD Apr 12 18:49:09.366000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000284630 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764616338373266613534396432366663613235623136616532353563 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.366000 audit: BPF prog-id=77 op=LOAD Apr 12 18:49:09.366000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000284678 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764616338373266613534396432366663613235623136616532353563 Apr 12 18:49:09.368000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:49:09.368000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.368000 audit: BPF prog-id=78 op=LOAD Apr 12 18:49:09.361000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1799 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653035333335386234306133313433663266346632626130336534 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1799 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653035333335386234306133313433663266346632626130336534 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.371000 audit: BPF prog-id=79 op=LOAD Apr 12 18:49:09.371000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00019f050 items=0 ppid=1799 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653035333335386234306133313433663266346632626130336534 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.372000 audit: BPF prog-id=80 op=LOAD Apr 12 18:49:09.372000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00019f098 items=0 ppid=1799 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653035333335386234306133313433663266346632626130336534 Apr 12 18:49:09.373000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:49:09.373000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.373000 audit: BPF prog-id=81 op=LOAD Apr 12 18:49:09.373000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00019f4a8 items=0 ppid=1799 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164653035333335386234306133313433663266346632626130336534 Apr 12 18:49:09.368000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000284a88 items=0 ppid=1785 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764616338373266613534396432366663613235623136616532353563 Apr 12 18:49:09.391836 env[1151]: time="2024-04-12T18:49:09.391783802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal,Uid:58fc8f0ca4671d9f280e68f6b3985aba,Namespace:kube-system,Attempt:0,} returns sandbox id \"6b845abec8e10f80bca18dca95dbd99dbf6886ca15205726f67f7d7fe1e955d8\"" Apr 12 18:49:09.396849 kubelet[1740]: E0412 18:49:09.396818 1740 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-21291" Apr 12 18:49:09.400133 env[1151]: time="2024-04-12T18:49:09.400061885Z" level=info msg="CreateContainer within sandbox \"6b845abec8e10f80bca18dca95dbd99dbf6886ca15205726f67f7d7fe1e955d8\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:49:09.405654 kubelet[1740]: W0412 18:49:09.405601 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.405787 kubelet[1740]: E0412 18:49:09.405669 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.18:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.431295 env[1151]: time="2024-04-12T18:49:09.431232616Z" level=info msg="CreateContainer within sandbox \"6b845abec8e10f80bca18dca95dbd99dbf6886ca15205726f67f7d7fe1e955d8\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"821f6200f08d98091c634ed528688be64af59ae51f4737bf32127b07a56b1cc4\"" Apr 12 18:49:09.432226 env[1151]: time="2024-04-12T18:49:09.432168653Z" level=info msg="StartContainer for \"821f6200f08d98091c634ed528688be64af59ae51f4737bf32127b07a56b1cc4\"" Apr 12 18:49:09.444734 env[1151]: time="2024-04-12T18:49:09.444689080Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal,Uid:c83aaa89cf870c3c57382b1f10a64c8a,Namespace:kube-system,Attempt:0,} returns sandbox id \"1de053358b40a3143f2f4f2ba03e49393ef1b66420c5ae0ea4fffafc06473274\"" Apr 12 18:49:09.448577 kubelet[1740]: E0412 18:49:09.448549 1740 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-21291" Apr 12 18:49:09.451131 env[1151]: time="2024-04-12T18:49:09.451050718Z" level=info msg="CreateContainer within sandbox \"1de053358b40a3143f2f4f2ba03e49393ef1b66420c5ae0ea4fffafc06473274\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:49:09.470824 env[1151]: time="2024-04-12T18:49:09.470770539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal,Uid:931ba5b3328564bcff0fe57b6d56443f,Namespace:kube-system,Attempt:0,} returns sandbox id \"7dac872fa549d26fca25b16ae255c93c89cade5e11d5d0074a8e7df5f68c1e6b\"" Apr 12 18:49:09.472775 env[1151]: time="2024-04-12T18:49:09.472727107Z" level=info msg="CreateContainer within sandbox \"1de053358b40a3143f2f4f2ba03e49393ef1b66420c5ae0ea4fffafc06473274\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7cf46ff82fb719a7c03f94fcee77e799e6ccf8ef4e8c5da53e0761e24bd42ae3\"" Apr 12 18:49:09.473472 env[1151]: time="2024-04-12T18:49:09.473433269Z" level=info msg="StartContainer for \"7cf46ff82fb719a7c03f94fcee77e799e6ccf8ef4e8c5da53e0761e24bd42ae3\"" Apr 12 18:49:09.481668 kubelet[1740]: E0412 18:49:09.481639 1740 kubelet_pods.go:414] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flat" Apr 12 18:49:09.487457 env[1151]: time="2024-04-12T18:49:09.487400077Z" level=info msg="CreateContainer within sandbox \"7dac872fa549d26fca25b16ae255c93c89cade5e11d5d0074a8e7df5f68c1e6b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:49:09.488790 systemd[1]: Started cri-containerd-821f6200f08d98091c634ed528688be64af59ae51f4737bf32127b07a56b1cc4.scope. Apr 12 18:49:09.519489 env[1151]: time="2024-04-12T18:49:09.519430590Z" level=info msg="CreateContainer within sandbox \"7dac872fa549d26fca25b16ae255c93c89cade5e11d5d0074a8e7df5f68c1e6b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"fe371ec30e38c273a58ec9a8e44be7749dc48d801358c5f2262375e3214084a0\"" Apr 12 18:49:09.520347 env[1151]: time="2024-04-12T18:49:09.520306247Z" level=info msg="StartContainer for \"fe371ec30e38c273a58ec9a8e44be7749dc48d801358c5f2262375e3214084a0\"" Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.522000 audit: BPF prog-id=82 op=LOAD Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1793 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316636323030663038643938303931633633346564353238363838 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1793 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316636323030663038643938303931633633346564353238363838 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit: BPF prog-id=83 op=LOAD Apr 12 18:49:09.523000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00028b160 items=0 ppid=1793 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316636323030663038643938303931633633346564353238363838 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit: BPF prog-id=84 op=LOAD Apr 12 18:49:09.523000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00028b1a8 items=0 ppid=1793 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316636323030663038643938303931633633346564353238363838 Apr 12 18:49:09.523000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:49:09.523000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { perfmon } for pid=1905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit[1905]: AVC avc: denied { bpf } for pid=1905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.523000 audit: BPF prog-id=85 op=LOAD Apr 12 18:49:09.523000 audit[1905]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00028b5b8 items=0 ppid=1793 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316636323030663038643938303931633633346564353238363838 Apr 12 18:49:09.540965 systemd[1]: Started cri-containerd-7cf46ff82fb719a7c03f94fcee77e799e6ccf8ef4e8c5da53e0761e24bd42ae3.scope. Apr 12 18:49:09.576144 kubelet[1740]: W0412 18:49:09.569584 1740 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.576144 kubelet[1740]: E0412 18:49:09.569637 1740 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.18:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.18:6443: connect: connection refused Apr 12 18:49:09.575651 systemd[1]: Started cri-containerd-fe371ec30e38c273a58ec9a8e44be7749dc48d801358c5f2262375e3214084a0.scope. Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.587000 audit: BPF prog-id=86 op=LOAD Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1799 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763663436666638326662373139613763303366393466636565373765 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1799 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763663436666638326662373139613763303366393466636565373765 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit: BPF prog-id=87 op=LOAD Apr 12 18:49:09.588000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025e20 items=0 ppid=1799 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763663436666638326662373139613763303366393466636565373765 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit: BPF prog-id=88 op=LOAD Apr 12 18:49:09.588000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025e68 items=0 ppid=1799 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763663436666638326662373139613763303366393466636565373765 Apr 12 18:49:09.588000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:49:09.588000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { perfmon } for pid=1928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit[1928]: AVC avc: denied { bpf } for pid=1928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.588000 audit: BPF prog-id=89 op=LOAD Apr 12 18:49:09.588000 audit[1928]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000354278 items=0 ppid=1799 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763663436666638326662373139613763303366393466636565373765 Apr 12 18:49:09.634757 env[1151]: time="2024-04-12T18:49:09.634689103Z" level=info msg="StartContainer for \"821f6200f08d98091c634ed528688be64af59ae51f4737bf32127b07a56b1cc4\" returns successfully" Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.651000 audit: BPF prog-id=90 op=LOAD Apr 12 18:49:09.651000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.651000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1785 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333731656333306533386332373361353865633961386534346265 Apr 12 18:49:09.651000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.651000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1785 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333731656333306533386332373361353865633961386534346265 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit: BPF prog-id=91 op=LOAD Apr 12 18:49:09.652000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000216370 items=0 ppid=1785 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333731656333306533386332373361353865633961386534346265 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit: BPF prog-id=92 op=LOAD Apr 12 18:49:09.652000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002163b8 items=0 ppid=1785 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333731656333306533386332373361353865633961386534346265 Apr 12 18:49:09.652000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:49:09.652000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { perfmon } for pid=1948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit[1948]: AVC avc: denied { bpf } for pid=1948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:09.652000 audit: BPF prog-id=93 op=LOAD Apr 12 18:49:09.652000 audit[1948]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002167c8 items=0 ppid=1785 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:09.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665333731656333306533386332373361353865633961386534346265 Apr 12 18:49:09.677038 env[1151]: time="2024-04-12T18:49:09.676977791Z" level=info msg="StartContainer for \"7cf46ff82fb719a7c03f94fcee77e799e6ccf8ef4e8c5da53e0761e24bd42ae3\" returns successfully" Apr 12 18:49:09.732945 env[1151]: time="2024-04-12T18:49:09.732885435Z" level=info msg="StartContainer for \"fe371ec30e38c273a58ec9a8e44be7749dc48d801358c5f2262375e3214084a0\" returns successfully" Apr 12 18:49:12.435425 kubelet[1740]: I0412 18:49:12.435382 1740 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:12.854000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:12.854000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0037220f0 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:49:12.854000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:49:12.854000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:12.854000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0083d4060 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:49:12.854000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:49:12.855000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=526945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:12.855000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0037223f0 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:49:12.855000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:49:12.887000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=526951 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:12.887000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c000d06e40 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:49:12.887000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:49:12.894000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:12.894000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c00938c700 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:49:12.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:49:12.894000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:12.894000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c000b8cbd0 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:49:12.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:49:13.142472 kubelet[1740]: E0412 18:49:13.142327 1740 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:13.169805 kubelet[1740]: I0412 18:49:13.169765 1740 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:13.206690 kubelet[1740]: E0412 18:49:13.206623 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.307803 kubelet[1740]: E0412 18:49:13.307762 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.409295 kubelet[1740]: E0412 18:49:13.409159 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.510274 kubelet[1740]: E0412 18:49:13.510236 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.611909 kubelet[1740]: E0412 18:49:13.611850 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.712981 kubelet[1740]: E0412 18:49:13.712841 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.737000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:13.737000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00060b440 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:13.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:13.738000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:13.738000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008d41e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:13.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:13.814045 kubelet[1740]: E0412 18:49:13.813982 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:13.915020 kubelet[1740]: E0412 18:49:13.914976 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.015541 kubelet[1740]: E0412 18:49:14.015491 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.116587 kubelet[1740]: E0412 18:49:14.116536 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.217518 kubelet[1740]: E0412 18:49:14.217472 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.318575 kubelet[1740]: E0412 18:49:14.318415 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.419558 kubelet[1740]: E0412 18:49:14.419517 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.520548 kubelet[1740]: E0412 18:49:14.520506 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.622520 kubelet[1740]: E0412 18:49:14.622391 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.723456 kubelet[1740]: E0412 18:49:14.723405 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.824359 kubelet[1740]: E0412 18:49:14.824297 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:14.925196 kubelet[1740]: E0412 18:49:14.925032 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:15.025835 kubelet[1740]: E0412 18:49:15.025771 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:15.125944 kubelet[1740]: E0412 18:49:15.125890 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:15.226570 kubelet[1740]: E0412 18:49:15.226366 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:15.327234 kubelet[1740]: E0412 18:49:15.327167 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:15.428021 kubelet[1740]: E0412 18:49:15.427958 1740 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" not found" Apr 12 18:49:15.800556 update_engine[1137]: I0412 18:49:15.800491 1137 update_attempter.cc:509] Updating boot flags... Apr 12 18:49:16.030697 systemd[1]: Reloading. Apr 12 18:49:16.083396 kubelet[1740]: I0412 18:49:16.082274 1740 apiserver.go:52] "Watching apiserver" Apr 12 18:49:16.091818 kubelet[1740]: I0412 18:49:16.091659 1740 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:49:16.162571 kubelet[1740]: I0412 18:49:16.162216 1740 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:49:16.212377 /usr/lib/systemd/system-generators/torcx-generator[2055]: time="2024-04-12T18:49:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:49:16.212420 /usr/lib/systemd/system-generators/torcx-generator[2055]: time="2024-04-12T18:49:16Z" level=info msg="torcx already run" Apr 12 18:49:16.310783 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:49:16.310812 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:49:16.336621 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.472285 kernel: kauditd_printk_skb: 364 callbacks suppressed Apr 12 18:49:16.472459 kernel: audit: type=1400 audit(1712947756.445:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.472502 kernel: audit: type=1400 audit(1712947756.445:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.514000 kernel: audit: type=1400 audit(1712947756.445:722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536113 kernel: audit: type=1400 audit(1712947756.445:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.559105 kernel: audit: type=1400 audit(1712947756.445:724): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.586728 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:49:16.586909 kernel: audit: type=1400 audit(1712947756.445:725): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.586966 kernel: audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.594901 kubelet[1740]: W0412 18:49:16.594850 1740 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:49:16.618635 kernel: audit: backlog limit exceeded Apr 12 18:49:16.618832 kernel: audit: type=1400 audit(1712947756.445:726): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit: BPF prog-id=94 op=LOAD Apr 12 18:49:16.491000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.513000 audit: BPF prog-id=95 op=LOAD Apr 12 18:49:16.513000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.535000 audit: BPF prog-id=96 op=LOAD Apr 12 18:49:16.535000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit: BPF prog-id=97 op=LOAD Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.536000 audit: BPF prog-id=98 op=LOAD Apr 12 18:49:16.536000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:49:16.536000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.557000 audit: BPF prog-id=99 op=LOAD Apr 12 18:49:16.557000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:49:16.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.618000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.636000 audit: BPF prog-id=110 op=LOAD Apr 12 18:49:16.636000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.637000 audit: BPF prog-id=111 op=LOAD Apr 12 18:49:16.637000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit: BPF prog-id=112 op=LOAD Apr 12 18:49:16.640000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit: BPF prog-id=113 op=LOAD Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.640000 audit: BPF prog-id=114 op=LOAD Apr 12 18:49:16.640000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:49:16.640000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:49:16.740271 kubelet[1740]: I0412 18:49:16.740214 1740 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:49:16.740389 systemd[1]: Stopping kubelet.service... Apr 12 18:49:16.763701 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:49:16.764155 systemd[1]: Stopped kubelet.service. Apr 12 18:49:16.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:16.764256 systemd[1]: kubelet.service: Consumed 1.095s CPU time. Apr 12 18:49:16.767513 systemd[1]: Started kubelet.service. Apr 12 18:49:16.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:16.879774 kubelet[2096]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:49:16.880294 kubelet[2096]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:49:16.880401 kubelet[2096]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:49:16.880623 kubelet[2096]: I0412 18:49:16.880573 2096 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:49:16.889921 kubelet[2096]: I0412 18:49:16.889891 2096 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:49:16.890139 kubelet[2096]: I0412 18:49:16.890121 2096 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:49:16.890603 kubelet[2096]: I0412 18:49:16.890580 2096 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:49:16.893682 kubelet[2096]: I0412 18:49:16.893651 2096 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:49:16.896033 kubelet[2096]: I0412 18:49:16.895977 2096 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:49:16.909124 kubelet[2096]: I0412 18:49:16.907761 2096 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:49:16.911116 kubelet[2096]: I0412 18:49:16.909772 2096 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:49:16.911116 kubelet[2096]: I0412 18:49:16.909956 2096 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:49:16.911116 kubelet[2096]: I0412 18:49:16.909990 2096 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:49:16.911116 kubelet[2096]: I0412 18:49:16.910010 2096 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:49:16.911116 kubelet[2096]: I0412 18:49:16.910062 2096 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:49:16.921560 kubelet[2096]: I0412 18:49:16.921524 2096 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:49:16.921560 kubelet[2096]: I0412 18:49:16.921565 2096 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:49:16.921801 kubelet[2096]: I0412 18:49:16.921591 2096 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:49:16.921801 kubelet[2096]: I0412 18:49:16.921621 2096 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:49:16.923195 kubelet[2096]: I0412 18:49:16.923166 2096 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:49:16.942843 kubelet[2096]: I0412 18:49:16.942792 2096 server.go:1168] "Started kubelet" Apr 12 18:49:16.954000 audit[2096]: AVC avc: denied { mac_admin } for pid=2096 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.954000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:49:16.955518 kubelet[2096]: I0412 18:49:16.955297 2096 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:49:16.954000 audit[2096]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000676480 a1=c0008ed368 a2=c000676450 a3=25 items=0 ppid=1 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:16.954000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:49:16.956207 kubelet[2096]: I0412 18:49:16.956190 2096 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:49:16.958147 kubelet[2096]: I0412 18:49:16.958109 2096 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:49:16.958333 kubelet[2096]: I0412 18:49:16.958273 2096 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:49:16.957000 audit[2096]: AVC avc: denied { mac_admin } for pid=2096 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:16.957000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:49:16.957000 audit[2096]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf9080 a1=c0008ed380 a2=c000676510 a3=25 items=0 ppid=1 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:16.957000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:49:16.958940 kubelet[2096]: I0412 18:49:16.958920 2096 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:49:16.959070 kubelet[2096]: I0412 18:49:16.959053 2096 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:49:16.972693 kubelet[2096]: I0412 18:49:16.972651 2096 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:49:16.975347 kubelet[2096]: I0412 18:49:16.975317 2096 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:49:16.990128 kubelet[2096]: E0412 18:49:16.989163 2096 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:49:16.990128 kubelet[2096]: E0412 18:49:16.989203 2096 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:49:17.015362 kubelet[2096]: I0412 18:49:17.015322 2096 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:49:17.017014 kubelet[2096]: I0412 18:49:17.016980 2096 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:49:17.017014 kubelet[2096]: I0412 18:49:17.017019 2096 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:49:17.017279 kubelet[2096]: I0412 18:49:17.017043 2096 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:49:17.017279 kubelet[2096]: E0412 18:49:17.017184 2096 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:49:17.083954 kubelet[2096]: I0412 18:49:17.083914 2096 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.117634 kubelet[2096]: E0412 18:49:17.117592 2096 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:49:17.127130 kubelet[2096]: I0412 18:49:17.127072 2096 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.127359 kubelet[2096]: I0412 18:49:17.127200 2096 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.134973 kubelet[2096]: I0412 18:49:17.134864 2096 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:49:17.134973 kubelet[2096]: I0412 18:49:17.134893 2096 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:49:17.134973 kubelet[2096]: I0412 18:49:17.134913 2096 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:49:17.135245 kubelet[2096]: I0412 18:49:17.135157 2096 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:49:17.135245 kubelet[2096]: I0412 18:49:17.135178 2096 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Apr 12 18:49:17.135245 kubelet[2096]: I0412 18:49:17.135195 2096 policy_none.go:49] "None policy: Start" Apr 12 18:49:17.138315 kubelet[2096]: I0412 18:49:17.138156 2096 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:49:17.138315 kubelet[2096]: I0412 18:49:17.138186 2096 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:49:17.138487 kubelet[2096]: I0412 18:49:17.138384 2096 state_mem.go:75] "Updated machine memory state" Apr 12 18:49:17.147884 kubelet[2096]: I0412 18:49:17.147855 2096 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:49:17.148003 kubelet[2096]: I0412 18:49:17.147935 2096 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:49:17.146000 audit[2096]: AVC avc: denied { mac_admin } for pid=2096 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:17.146000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:49:17.146000 audit[2096]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000746ab0 a1=c000e1d020 a2=c000746a80 a3=25 items=0 ppid=1 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:17.146000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:49:17.150837 kubelet[2096]: I0412 18:49:17.150778 2096 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:49:17.318744 kubelet[2096]: I0412 18:49:17.318702 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:17.319076 kubelet[2096]: I0412 18:49:17.319056 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:17.319383 kubelet[2096]: I0412 18:49:17.319352 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:17.329343 kubelet[2096]: W0412 18:49:17.329318 2096 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:49:17.332432 kubelet[2096]: W0412 18:49:17.332410 2096 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:49:17.332699 kubelet[2096]: E0412 18:49:17.332683 2096 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.334038 kubelet[2096]: W0412 18:49:17.334007 2096 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:49:17.379686 kubelet[2096]: I0412 18:49:17.379647 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c83aaa89cf870c3c57382b1f10a64c8a-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"c83aaa89cf870c3c57382b1f10a64c8a\") " pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.379954 kubelet[2096]: I0412 18:49:17.379927 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.380142 kubelet[2096]: I0412 18:49:17.380126 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.380322 kubelet[2096]: I0412 18:49:17.380308 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.380488 kubelet[2096]: I0412 18:49:17.380475 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c83aaa89cf870c3c57382b1f10a64c8a-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"c83aaa89cf870c3c57382b1f10a64c8a\") " pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.380667 kubelet[2096]: I0412 18:49:17.380643 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c83aaa89cf870c3c57382b1f10a64c8a-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"c83aaa89cf870c3c57382b1f10a64c8a\") " pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.380806 kubelet[2096]: I0412 18:49:17.380793 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.380968 kubelet[2096]: I0412 18:49:17.380955 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/931ba5b3328564bcff0fe57b6d56443f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"931ba5b3328564bcff0fe57b6d56443f\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.381166 kubelet[2096]: I0412 18:49:17.381152 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/58fc8f0ca4671d9f280e68f6b3985aba-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal\" (UID: \"58fc8f0ca4671d9f280e68f6b3985aba\") " pod="kube-system/kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:49:17.933879 kubelet[2096]: I0412 18:49:17.933838 2096 apiserver.go:52] "Watching apiserver" Apr 12 18:49:17.976391 kubelet[2096]: I0412 18:49:17.976335 2096 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:49:17.985391 kubelet[2096]: I0412 18:49:17.985350 2096 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:49:18.185970 kubelet[2096]: I0412 18:49:18.185821 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" podStartSLOduration=2.185727905 podCreationTimestamp="2024-04-12 18:49:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:49:18.137123826 +0000 UTC m=+1.360815546" watchObservedRunningTime="2024-04-12 18:49:18.185727905 +0000 UTC m=+1.409419623" Apr 12 18:49:18.248043 kubelet[2096]: I0412 18:49:18.247980 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" podStartSLOduration=1.247817195 podCreationTimestamp="2024-04-12 18:49:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:49:18.188162519 +0000 UTC m=+1.411854243" watchObservedRunningTime="2024-04-12 18:49:18.247817195 +0000 UTC m=+1.471508919" Apr 12 18:49:18.248478 kubelet[2096]: I0412 18:49:18.248452 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" podStartSLOduration=1.248393085 podCreationTimestamp="2024-04-12 18:49:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:49:18.248107108 +0000 UTC m=+1.471798811" watchObservedRunningTime="2024-04-12 18:49:18.248393085 +0000 UTC m=+1.472084805" Apr 12 18:49:21.851941 sudo[1359]: pam_unix(sudo:session): session closed for user root Apr 12 18:49:21.850000 audit[1359]: USER_END pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:49:21.858599 kernel: kauditd_printk_skb: 474 callbacks suppressed Apr 12 18:49:21.858724 kernel: audit: type=1106 audit(1712947761.850:856): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:49:21.855000 audit[1359]: CRED_DISP pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:49:21.905947 kernel: audit: type=1104 audit(1712947761.855:857): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:49:21.909977 sshd[1356]: pam_unix(sshd:session): session closed for user core Apr 12 18:49:21.910000 audit[1356]: USER_END pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:49:21.915952 systemd-logind[1136]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:49:21.918453 systemd[1]: sshd@6-10.128.0.18:22-139.178.89.65:36308.service: Deactivated successfully. Apr 12 18:49:21.919590 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:49:21.919816 systemd[1]: session-7.scope: Consumed 6.210s CPU time. Apr 12 18:49:21.922467 systemd-logind[1136]: Removed session 7. Apr 12 18:49:21.911000 audit[1356]: CRED_DISP pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:49:21.968636 kernel: audit: type=1106 audit(1712947761.910:858): pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:49:21.968801 kernel: audit: type=1104 audit(1712947761.911:859): pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:49:21.968849 kernel: audit: type=1131 audit(1712947761.917:860): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.18:22-139.178.89.65:36308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:21.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.18:22-139.178.89.65:36308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:49:26.761000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=526976 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:49:26.761000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002ddb80 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:26.824903 kernel: audit: type=1400 audit(1712947766.761:861): avc: denied { watch } for pid=1965 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=526976 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:49:26.825041 kernel: audit: type=1300 audit(1712947766.761:861): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0002ddb80 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:26.825142 kernel: audit: type=1327 audit(1712947766.761:861): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:26.761000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.391000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.391000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.444613 kernel: audit: type=1400 audit(1712947770.391:862): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.444776 kernel: audit: type=1400 audit(1712947770.391:863): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.444822 kernel: audit: type=1300 audit(1712947770.391:863): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000abed00 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.391000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000abed00 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.507558 kernel: audit: type=1327 audit(1712947770.391:863): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.507731 kernel: audit: type=1400 audit(1712947770.391:864): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.391000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.391000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000abed40 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.567744 kernel: audit: type=1300 audit(1712947770.391:864): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000abed40 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.567921 kernel: audit: type=1327 audit(1712947770.391:864): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.391000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.622235 kernel: audit: type=1400 audit(1712947770.391:865): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:49:30.622409 kernel: audit: type=1300 audit(1712947770.391:865): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000abed80 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.391000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000abed80 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.685211 kernel: audit: type=1327 audit(1712947770.391:865): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.391000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008efa20 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:49:30.391000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:49:30.760493 kubelet[2096]: I0412 18:49:30.760458 2096 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:49:30.761771 env[1151]: time="2024-04-12T18:49:30.761714180Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:49:30.762753 kubelet[2096]: I0412 18:49:30.762729 2096 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:49:30.783186 kubelet[2096]: I0412 18:49:30.783145 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:30.791721 systemd[1]: Created slice kubepods-besteffort-podf79ea224_8f94_4330_a2b4_ab913468cf74.slice. Apr 12 18:49:30.867399 kubelet[2096]: I0412 18:49:30.867356 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f79ea224-8f94-4330-a2b4-ab913468cf74-lib-modules\") pod \"kube-proxy-4lc8t\" (UID: \"f79ea224-8f94-4330-a2b4-ab913468cf74\") " pod="kube-system/kube-proxy-4lc8t" Apr 12 18:49:30.867700 kubelet[2096]: I0412 18:49:30.867677 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-282bd\" (UniqueName: \"kubernetes.io/projected/f79ea224-8f94-4330-a2b4-ab913468cf74-kube-api-access-282bd\") pod \"kube-proxy-4lc8t\" (UID: \"f79ea224-8f94-4330-a2b4-ab913468cf74\") " pod="kube-system/kube-proxy-4lc8t" Apr 12 18:49:30.867874 kubelet[2096]: I0412 18:49:30.867857 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f79ea224-8f94-4330-a2b4-ab913468cf74-kube-proxy\") pod \"kube-proxy-4lc8t\" (UID: \"f79ea224-8f94-4330-a2b4-ab913468cf74\") " pod="kube-system/kube-proxy-4lc8t" Apr 12 18:49:30.868050 kubelet[2096]: I0412 18:49:30.868032 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f79ea224-8f94-4330-a2b4-ab913468cf74-xtables-lock\") pod \"kube-proxy-4lc8t\" (UID: \"f79ea224-8f94-4330-a2b4-ab913468cf74\") " pod="kube-system/kube-proxy-4lc8t" Apr 12 18:49:30.977698 kubelet[2096]: E0412 18:49:30.977575 2096 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Apr 12 18:49:30.977964 kubelet[2096]: E0412 18:49:30.977942 2096 projected.go:198] Error preparing data for projected volume kube-api-access-282bd for pod kube-system/kube-proxy-4lc8t: configmap "kube-root-ca.crt" not found Apr 12 18:49:30.978248 kubelet[2096]: E0412 18:49:30.978221 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/f79ea224-8f94-4330-a2b4-ab913468cf74-kube-api-access-282bd podName:f79ea224-8f94-4330-a2b4-ab913468cf74 nodeName:}" failed. No retries permitted until 2024-04-12 18:49:31.478179076 +0000 UTC m=+14.701870794 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-282bd" (UniqueName: "kubernetes.io/projected/f79ea224-8f94-4330-a2b4-ab913468cf74-kube-api-access-282bd") pod "kube-proxy-4lc8t" (UID: "f79ea224-8f94-4330-a2b4-ab913468cf74") : configmap "kube-root-ca.crt" not found Apr 12 18:49:31.688801 kubelet[2096]: I0412 18:49:31.688740 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:31.701860 systemd[1]: Created slice kubepods-besteffort-pod4583b8d7_ed4a_4b40_885d_d4925efaa234.slice. Apr 12 18:49:31.706285 env[1151]: time="2024-04-12T18:49:31.706232529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4lc8t,Uid:f79ea224-8f94-4330-a2b4-ab913468cf74,Namespace:kube-system,Attempt:0,}" Apr 12 18:49:31.751535 env[1151]: time="2024-04-12T18:49:31.751426585Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:31.751535 env[1151]: time="2024-04-12T18:49:31.751484648Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:31.752643 env[1151]: time="2024-04-12T18:49:31.751512671Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:31.752643 env[1151]: time="2024-04-12T18:49:31.752005311Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b2b8746ecca4e65142b34692c0a3ceedb5a63af89e546145ebca0f7147fca5a pid=2182 runtime=io.containerd.runc.v2 Apr 12 18:49:31.780209 systemd[1]: run-containerd-runc-k8s.io-6b2b8746ecca4e65142b34692c0a3ceedb5a63af89e546145ebca0f7147fca5a-runc.NkBaHs.mount: Deactivated successfully. Apr 12 18:49:31.783716 kubelet[2096]: I0412 18:49:31.782666 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xvsl9\" (UniqueName: \"kubernetes.io/projected/4583b8d7-ed4a-4b40-885d-d4925efaa234-kube-api-access-xvsl9\") pod \"tigera-operator-786dc9d695-xtb5f\" (UID: \"4583b8d7-ed4a-4b40-885d-d4925efaa234\") " pod="tigera-operator/tigera-operator-786dc9d695-xtb5f" Apr 12 18:49:31.783716 kubelet[2096]: I0412 18:49:31.782738 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4583b8d7-ed4a-4b40-885d-d4925efaa234-var-lib-calico\") pod \"tigera-operator-786dc9d695-xtb5f\" (UID: \"4583b8d7-ed4a-4b40-885d-d4925efaa234\") " pod="tigera-operator/tigera-operator-786dc9d695-xtb5f" Apr 12 18:49:31.787369 systemd[1]: Started cri-containerd-6b2b8746ecca4e65142b34692c0a3ceedb5a63af89e546145ebca0f7147fca5a.scope. Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.805000 audit: BPF prog-id=115 op=LOAD Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662326238373436656363613465363531343262333436393263306133 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662326238373436656363613465363531343262333436393263306133 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit: BPF prog-id=116 op=LOAD Apr 12 18:49:31.806000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024e30 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662326238373436656363613465363531343262333436393263306133 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.806000 audit: BPF prog-id=117 op=LOAD Apr 12 18:49:31.806000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024e78 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662326238373436656363613465363531343262333436393263306133 Apr 12 18:49:31.807000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:49:31.807000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.807000 audit: BPF prog-id=118 op=LOAD Apr 12 18:49:31.807000 audit[2192]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025288 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662326238373436656363613465363531343262333436393263306133 Apr 12 18:49:31.824787 env[1151]: time="2024-04-12T18:49:31.824733394Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4lc8t,Uid:f79ea224-8f94-4330-a2b4-ab913468cf74,Namespace:kube-system,Attempt:0,} returns sandbox id \"6b2b8746ecca4e65142b34692c0a3ceedb5a63af89e546145ebca0f7147fca5a\"" Apr 12 18:49:31.830266 env[1151]: time="2024-04-12T18:49:31.830219360Z" level=info msg="CreateContainer within sandbox \"6b2b8746ecca4e65142b34692c0a3ceedb5a63af89e546145ebca0f7147fca5a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:49:31.849749 env[1151]: time="2024-04-12T18:49:31.849440759Z" level=info msg="CreateContainer within sandbox \"6b2b8746ecca4e65142b34692c0a3ceedb5a63af89e546145ebca0f7147fca5a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"63ba904d07da20b1f89bd3ec5b11e26d781ce0538cf0b2c642085790f03affe7\"" Apr 12 18:49:31.852675 env[1151]: time="2024-04-12T18:49:31.852630895Z" level=info msg="StartContainer for \"63ba904d07da20b1f89bd3ec5b11e26d781ce0538cf0b2c642085790f03affe7\"" Apr 12 18:49:31.881054 systemd[1]: Started cri-containerd-63ba904d07da20b1f89bd3ec5b11e26d781ce0538cf0b2c642085790f03affe7.scope. Apr 12 18:49:31.912000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.912000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f42aa46a2e8 items=0 ppid=2182 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626139303464303764613230623166383962643365633562313165 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit: BPF prog-id=119 op=LOAD Apr 12 18:49:31.913000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00030c948 items=0 ppid=2182 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626139303464303764613230623166383962643365633562313165 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit: BPF prog-id=120 op=LOAD Apr 12 18:49:31.913000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00030c998 items=0 ppid=2182 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626139303464303764613230623166383962643365633562313165 Apr 12 18:49:31.913000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:49:31.913000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { perfmon } for pid=2224 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit[2224]: AVC avc: denied { bpf } for pid=2224 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:31.913000 audit: BPF prog-id=121 op=LOAD Apr 12 18:49:31.913000 audit[2224]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00030ca28 items=0 ppid=2182 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:31.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633626139303464303764613230623166383962643365633562313165 Apr 12 18:49:31.936584 env[1151]: time="2024-04-12T18:49:31.936527318Z" level=info msg="StartContainer for \"63ba904d07da20b1f89bd3ec5b11e26d781ce0538cf0b2c642085790f03affe7\" returns successfully" Apr 12 18:49:32.007133 env[1151]: time="2024-04-12T18:49:32.007053121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-xtb5f,Uid:4583b8d7-ed4a-4b40-885d-d4925efaa234,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:49:32.033000 audit[2293]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.033000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c0f5810 a2=0 a3=7ffd9c0f57fc items=0 ppid=2235 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.033000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:49:32.035707 env[1151]: time="2024-04-12T18:49:32.029980904Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:32.035707 env[1151]: time="2024-04-12T18:49:32.030037789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:32.035707 env[1151]: time="2024-04-12T18:49:32.030058693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:32.035707 env[1151]: time="2024-04-12T18:49:32.030291036Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f6431fde35fd5c95b12fe6f79661059947723e64b5df1f005f55ba310e883fc8 pid=2282 runtime=io.containerd.runc.v2 Apr 12 18:49:32.037000 audit[2294]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.037000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda9d400a0 a2=0 a3=7ffda9d4008c items=0 ppid=2235 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:49:32.039000 audit[2295]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.039000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9e9fbf0 a2=0 a3=7ffde9e9fbdc items=0 ppid=2235 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:49:32.072000 audit[2303]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.072000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1d698490 a2=0 a3=7ffe1d69847c items=0 ppid=2235 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:49:32.074000 audit[2297]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.074000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc372bfc60 a2=0 a3=7ffc372bfc4c items=0 ppid=2235 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:49:32.076000 audit[2307]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.076000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc978d5cf0 a2=0 a3=7ffc978d5cdc items=0 ppid=2235 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:49:32.079319 systemd[1]: Started cri-containerd-f6431fde35fd5c95b12fe6f79661059947723e64b5df1f005f55ba310e883fc8.scope. Apr 12 18:49:32.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.109000 audit: BPF prog-id=122 op=LOAD Apr 12 18:49:32.111732 kubelet[2096]: I0412 18:49:32.110664 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-4lc8t" podStartSLOduration=2.110612602 podCreationTimestamp="2024-04-12 18:49:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:49:32.107421267 +0000 UTC m=+15.331113014" watchObservedRunningTime="2024-04-12 18:49:32.110612602 +0000 UTC m=+15.334304327" Apr 12 18:49:32.111000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.111000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2282 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636343331666465333566643563393562313266653666373936363130 Apr 12 18:49:32.111000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.111000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=2282 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636343331666465333566643563393562313266653666373936363130 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.112000 audit: BPF prog-id=123 op=LOAD Apr 12 18:49:32.112000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0002fe8c0 items=0 ppid=2282 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636343331666465333566643563393562313266653666373936363130 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit: BPF prog-id=124 op=LOAD Apr 12 18:49:32.114000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0002fe908 items=0 ppid=2282 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636343331666465333566643563393562313266653666373936363130 Apr 12 18:49:32.114000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:49:32.114000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { perfmon } for pid=2296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit[2296]: AVC avc: denied { bpf } for pid=2296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:32.114000 audit: BPF prog-id=125 op=LOAD Apr 12 18:49:32.114000 audit[2296]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0002fed18 items=0 ppid=2282 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636343331666465333566643563393562313266653666373936363130 Apr 12 18:49:32.151000 audit[2315]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.151000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffdcabbed0 a2=0 a3=7fffdcabbebc items=0 ppid=2235 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:49:32.157000 audit[2319]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.157000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff827d49d0 a2=0 a3=7fff827d49bc items=0 ppid=2235 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:49:32.168000 audit[2326]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.168000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdc10bd700 a2=0 a3=7ffdc10bd6ec items=0 ppid=2235 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:49:32.170000 audit[2327]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.170000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07b31ab0 a2=0 a3=7ffe07b31a9c items=0 ppid=2235 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:49:32.177077 env[1151]: time="2024-04-12T18:49:32.177026687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-xtb5f,Uid:4583b8d7-ed4a-4b40-885d-d4925efaa234,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f6431fde35fd5c95b12fe6f79661059947723e64b5df1f005f55ba310e883fc8\"" Apr 12 18:49:32.181760 kubelet[2096]: E0412 18:49:32.181708 2096 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Apr 12 18:49:32.182276 env[1151]: time="2024-04-12T18:49:32.182236011Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:49:32.182000 audit[2330]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.182000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff085ad260 a2=0 a3=7fff085ad24c items=0 ppid=2235 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:49:32.185000 audit[2331]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.185000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc61950a20 a2=0 a3=7ffc61950a0c items=0 ppid=2235 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:49:32.190000 audit[2333]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.190000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffc69d9190 a2=0 a3=7fffc69d917c items=0 ppid=2235 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:49:32.197000 audit[2336]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.197000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd6c101910 a2=0 a3=7ffd6c1018fc items=0 ppid=2235 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:49:32.200000 audit[2337]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.200000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07e47110 a2=0 a3=7ffe07e470fc items=0 ppid=2235 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:49:32.204000 audit[2339]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.204000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda9404530 a2=0 a3=7ffda940451c items=0 ppid=2235 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:49:32.205000 audit[2340]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.205000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed33ff240 a2=0 a3=7ffed33ff22c items=0 ppid=2235 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:49:32.209000 audit[2342]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.209000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc9b3d5540 a2=0 a3=7ffc9b3d552c items=0 ppid=2235 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.209000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:49:32.215000 audit[2345]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.215000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe74f48860 a2=0 a3=7ffe74f4884c items=0 ppid=2235 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:49:32.220000 audit[2348]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.220000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe82c00470 a2=0 a3=7ffe82c0045c items=0 ppid=2235 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:49:32.222000 audit[2349]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.222000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc8f89b600 a2=0 a3=7ffc8f89b5ec items=0 ppid=2235 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:49:32.226000 audit[2351]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.226000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc2b6eb020 a2=0 a3=7ffc2b6eb00c items=0 ppid=2235 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:49:32.231000 audit[2354]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.231000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfebb0010 a2=0 a3=7ffcfebafffc items=0 ppid=2235 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:49:32.239000 audit[2359]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.239000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3bfd2650 a2=0 a3=7fff3bfd263c items=0 ppid=2235 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.239000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:49:32.244000 audit[2361]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:49:32.244000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcf86684f0 a2=0 a3=7ffcf86684dc items=0 ppid=2235 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.244000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:49:32.271000 audit[2363]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:32.271000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcc8f451f0 a2=0 a3=7ffcc8f451dc items=0 ppid=2235 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:32.283000 audit[2363]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:32.283000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffcc8f451f0 a2=0 a3=7ffcc8f451dc items=0 ppid=2235 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.283000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:32.286000 audit[2368]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.286000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe63d46e10 a2=0 a3=7ffe63d46dfc items=0 ppid=2235 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:49:32.291000 audit[2370]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.291000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdec4556d0 a2=0 a3=7ffdec4556bc items=0 ppid=2235 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:49:32.298000 audit[2373]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.298000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe417e0090 a2=0 a3=7ffe417e007c items=0 ppid=2235 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:49:32.300000 audit[2374]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.300000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee80547b0 a2=0 a3=7ffee805479c items=0 ppid=2235 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:49:32.303000 audit[2376]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.303000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf3da2960 a2=0 a3=7ffdf3da294c items=0 ppid=2235 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:49:32.305000 audit[2377]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.305000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffccefa870 a2=0 a3=7fffccefa85c items=0 ppid=2235 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:49:32.309000 audit[2379]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.309000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc32835300 a2=0 a3=7ffc328352ec items=0 ppid=2235 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:49:32.314000 audit[2382]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.314000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff3569000 a2=0 a3=7ffff3568fec items=0 ppid=2235 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:49:32.315000 audit[2383]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.315000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc7bb1ac0 a2=0 a3=7ffdc7bb1aac items=0 ppid=2235 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:49:32.319000 audit[2385]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.319000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb63efe50 a2=0 a3=7ffcb63efe3c items=0 ppid=2235 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:49:32.321000 audit[2386]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.321000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca1f07690 a2=0 a3=7ffca1f0767c items=0 ppid=2235 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:49:32.324000 audit[2388]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.324000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffe0693ca0 a2=0 a3=7fffe0693c8c items=0 ppid=2235 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:49:32.330000 audit[2391]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.330000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc21594ca0 a2=0 a3=7ffc21594c8c items=0 ppid=2235 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:49:32.335000 audit[2394]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.335000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf8efef40 a2=0 a3=7ffdf8efef2c items=0 ppid=2235 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:49:32.337000 audit[2395]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.337000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1e29fae0 a2=0 a3=7ffd1e29facc items=0 ppid=2235 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:49:32.340000 audit[2397]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.340000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdd5183220 a2=0 a3=7ffdd518320c items=0 ppid=2235 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:49:32.346000 audit[2400]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.346000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc949cdb50 a2=0 a3=7ffc949cdb3c items=0 ppid=2235 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:49:32.348000 audit[2401]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2401 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.348000 audit[2401]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc7613b020 a2=0 a3=7ffc7613b00c items=0 ppid=2235 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:49:32.351000 audit[2403]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.351000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd26e129b0 a2=0 a3=7ffd26e1299c items=0 ppid=2235 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.351000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:49:32.356000 audit[2406]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.356000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1ad99400 a2=0 a3=7ffd1ad993ec items=0 ppid=2235 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:49:32.358000 audit[2407]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.358000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf9539cd0 a2=0 a3=7ffcf9539cbc items=0 ppid=2235 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:49:32.362000 audit[2409]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:49:32.362000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd28c20170 a2=0 a3=7ffd28c2015c items=0 ppid=2235 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.362000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:49:32.366000 audit[2411]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:49:32.366000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd5e6305d0 a2=0 a3=7ffd5e6305bc items=0 ppid=2235 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.366000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:32.367000 audit[2411]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:49:32.367000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd5e6305d0 a2=0 a3=7ffd5e6305bc items=0 ppid=2235 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:32.367000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:34.288228 env[1151]: time="2024-04-12T18:49:34.288139548Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:34.291077 env[1151]: time="2024-04-12T18:49:34.291032082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:34.293587 env[1151]: time="2024-04-12T18:49:34.293538156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:34.295848 env[1151]: time="2024-04-12T18:49:34.295809839Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:34.296729 env[1151]: time="2024-04-12T18:49:34.296677231Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:49:34.300771 env[1151]: time="2024-04-12T18:49:34.300726112Z" level=info msg="CreateContainer within sandbox \"f6431fde35fd5c95b12fe6f79661059947723e64b5df1f005f55ba310e883fc8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:49:34.325870 env[1151]: time="2024-04-12T18:49:34.325806334Z" level=info msg="CreateContainer within sandbox \"f6431fde35fd5c95b12fe6f79661059947723e64b5df1f005f55ba310e883fc8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"12f2a640c560ee3a468a7a6eb9f287659eadb1121620db21b9ab16882168350f\"" Apr 12 18:49:34.326760 env[1151]: time="2024-04-12T18:49:34.326723855Z" level=info msg="StartContainer for \"12f2a640c560ee3a468a7a6eb9f287659eadb1121620db21b9ab16882168350f\"" Apr 12 18:49:34.362030 systemd[1]: Started cri-containerd-12f2a640c560ee3a468a7a6eb9f287659eadb1121620db21b9ab16882168350f.scope. Apr 12 18:49:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.378000 audit: BPF prog-id=126 op=LOAD Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2282 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:34.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132663261363430633536306565336134363861376136656239663238 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2282 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:34.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132663261363430633536306565336134363861376136656239663238 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.379000 audit: BPF prog-id=127 op=LOAD Apr 12 18:49:34.379000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000201160 items=0 ppid=2282 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:34.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132663261363430633536306565336134363861376136656239663238 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.381000 audit: BPF prog-id=128 op=LOAD Apr 12 18:49:34.381000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002011a8 items=0 ppid=2282 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:34.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132663261363430633536306565336134363861376136656239663238 Apr 12 18:49:34.381000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:49:34.382000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { perfmon } for pid=2420 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit[2420]: AVC avc: denied { bpf } for pid=2420 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:34.382000 audit: BPF prog-id=129 op=LOAD Apr 12 18:49:34.382000 audit[2420]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002015b8 items=0 ppid=2282 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:34.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132663261363430633536306565336134363861376136656239663238 Apr 12 18:49:34.404152 env[1151]: time="2024-04-12T18:49:34.402872668Z" level=info msg="StartContainer for \"12f2a640c560ee3a468a7a6eb9f287659eadb1121620db21b9ab16882168350f\" returns successfully" Apr 12 18:49:36.469136 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 18:49:36.469281 kernel: audit: type=1325 audit(1712947776.461:977): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.461000 audit[2452]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.486132 kernel: audit: type=1300 audit(1712947776.461:977): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff7e281010 a2=0 a3=7fff7e280ffc items=0 ppid=2235 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.461000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff7e281010 a2=0 a3=7fff7e280ffc items=0 ppid=2235 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.518116 kernel: audit: type=1327 audit(1712947776.461:977): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.462000 audit[2452]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.548878 kernel: audit: type=1325 audit(1712947776.462:978): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.549015 kernel: audit: type=1300 audit(1712947776.462:978): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff7e281010 a2=0 a3=0 items=0 ppid=2235 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.462000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff7e281010 a2=0 a3=0 items=0 ppid=2235 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.581127 kernel: audit: type=1327 audit(1712947776.462:978): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.635380 kubelet[2096]: I0412 18:49:36.635325 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-786dc9d695-xtb5f" podStartSLOduration=3.51661494 podCreationTimestamp="2024-04-12 18:49:31 +0000 UTC" firstStartedPulling="2024-04-12 18:49:32.178563629 +0000 UTC m=+15.402255340" lastFinishedPulling="2024-04-12 18:49:34.297218577 +0000 UTC m=+17.520910294" observedRunningTime="2024-04-12 18:49:35.113399123 +0000 UTC m=+18.337090847" watchObservedRunningTime="2024-04-12 18:49:36.635269894 +0000 UTC m=+19.858961654" Apr 12 18:49:36.636012 kubelet[2096]: I0412 18:49:36.635632 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:36.641757 kubelet[2096]: W0412 18:49:36.641724 2096 reflector.go:533] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:36.642034 kubelet[2096]: E0412 18:49:36.642014 2096 reflector.go:148] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:36.642353 kubelet[2096]: W0412 18:49:36.642330 2096 reflector.go:533] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:36.642540 kubelet[2096]: E0412 18:49:36.642522 2096 reflector.go:148] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:36.642767 kubelet[2096]: W0412 18:49:36.642737 2096 reflector.go:533] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:36.642910 kubelet[2096]: E0412 18:49:36.642894 2096 reflector.go:148] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:36.649036 systemd[1]: Created slice kubepods-besteffort-pode6369fdc_45ef_46ee_a4a9_e8045e17c74f.slice. Apr 12 18:49:36.692000 audit[2454]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.692000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd9f331c00 a2=0 a3=7ffd9f331bec items=0 ppid=2235 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.714062 kubelet[2096]: I0412 18:49:36.714031 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qbp97\" (UniqueName: \"kubernetes.io/projected/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-kube-api-access-qbp97\") pod \"calico-typha-5b944cffcb-c4xrh\" (UID: \"e6369fdc-45ef-46ee-a4a9-e8045e17c74f\") " pod="calico-system/calico-typha-5b944cffcb-c4xrh" Apr 12 18:49:36.714326 kubelet[2096]: I0412 18:49:36.714301 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-typha-certs\") pod \"calico-typha-5b944cffcb-c4xrh\" (UID: \"e6369fdc-45ef-46ee-a4a9-e8045e17c74f\") " pod="calico-system/calico-typha-5b944cffcb-c4xrh" Apr 12 18:49:36.714561 kubelet[2096]: I0412 18:49:36.714546 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-tigera-ca-bundle\") pod \"calico-typha-5b944cffcb-c4xrh\" (UID: \"e6369fdc-45ef-46ee-a4a9-e8045e17c74f\") " pod="calico-system/calico-typha-5b944cffcb-c4xrh" Apr 12 18:49:36.743417 kernel: audit: type=1325 audit(1712947776.692:979): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.743538 kernel: audit: type=1300 audit(1712947776.692:979): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd9f331c00 a2=0 a3=7ffd9f331bec items=0 ppid=2235 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.743583 kernel: audit: type=1327 audit(1712947776.692:979): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.693000 audit[2454]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.693000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd9f331c00 a2=0 a3=0 items=0 ppid=2235 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:36.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:36.779790 kernel: audit: type=1325 audit(1712947776.693:980): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:36.805289 kubelet[2096]: I0412 18:49:36.805248 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:36.824215 systemd[1]: Created slice kubepods-besteffort-podc593f3d0_a68f_4d3b_a4fd_ebb2d31a5392.slice. Apr 12 18:49:36.917259 kubelet[2096]: I0412 18:49:36.917211 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-cni-log-dir\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.917638 kubelet[2096]: I0412 18:49:36.917610 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-lib-modules\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.917815 kubelet[2096]: I0412 18:49:36.917797 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-flexvol-driver-host\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.917964 kubelet[2096]: I0412 18:49:36.917945 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-cni-bin-dir\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.918140 kubelet[2096]: I0412 18:49:36.918120 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-policysync\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.918334 kubelet[2096]: I0412 18:49:36.918313 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-xtables-lock\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.918508 kubelet[2096]: I0412 18:49:36.918488 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-node-certs\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.918655 kubelet[2096]: I0412 18:49:36.918636 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-var-lib-calico\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.918792 kubelet[2096]: I0412 18:49:36.918775 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-tigera-ca-bundle\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.918936 kubelet[2096]: I0412 18:49:36.918918 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-cni-net-dir\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.919112 kubelet[2096]: I0412 18:49:36.919073 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l9gqf\" (UniqueName: \"kubernetes.io/projected/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-kube-api-access-l9gqf\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.919279 kubelet[2096]: I0412 18:49:36.919261 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-var-run-calico\") pod \"calico-node-jkz4t\" (UID: \"c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392\") " pod="calico-system/calico-node-jkz4t" Apr 12 18:49:36.932645 kubelet[2096]: I0412 18:49:36.932609 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:36.933302 kubelet[2096]: E0412 18:49:36.933272 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:37.019816 kubelet[2096]: I0412 18:49:37.019669 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4ac34cc8-3435-448d-b1fb-84732b25d8cb-varrun\") pod \"csi-node-driver-fskrn\" (UID: \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\") " pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:37.019816 kubelet[2096]: I0412 18:49:37.019743 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4ac34cc8-3435-448d-b1fb-84732b25d8cb-socket-dir\") pod \"csi-node-driver-fskrn\" (UID: \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\") " pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:37.019816 kubelet[2096]: I0412 18:49:37.019779 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4ac34cc8-3435-448d-b1fb-84732b25d8cb-kubelet-dir\") pod \"csi-node-driver-fskrn\" (UID: \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\") " pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:37.019816 kubelet[2096]: I0412 18:49:37.019819 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4ac34cc8-3435-448d-b1fb-84732b25d8cb-registration-dir\") pod \"csi-node-driver-fskrn\" (UID: \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\") " pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:37.020174 kubelet[2096]: I0412 18:49:37.019855 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j6wml\" (UniqueName: \"kubernetes.io/projected/4ac34cc8-3435-448d-b1fb-84732b25d8cb-kube-api-access-j6wml\") pod \"csi-node-driver-fskrn\" (UID: \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\") " pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:37.038023 kubelet[2096]: E0412 18:49:37.037995 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.038253 kubelet[2096]: W0412 18:49:37.038229 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.038389 kubelet[2096]: E0412 18:49:37.038371 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.121602 kubelet[2096]: E0412 18:49:37.121565 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.121849 kubelet[2096]: W0412 18:49:37.121822 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.122030 kubelet[2096]: E0412 18:49:37.122010 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.122692 kubelet[2096]: E0412 18:49:37.122672 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.122845 kubelet[2096]: W0412 18:49:37.122825 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.122971 kubelet[2096]: E0412 18:49:37.122956 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.123476 kubelet[2096]: E0412 18:49:37.123458 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.123609 kubelet[2096]: W0412 18:49:37.123588 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.123753 kubelet[2096]: E0412 18:49:37.123737 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.124202 kubelet[2096]: E0412 18:49:37.124184 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.124327 kubelet[2096]: W0412 18:49:37.124309 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.124458 kubelet[2096]: E0412 18:49:37.124444 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.124929 kubelet[2096]: E0412 18:49:37.124907 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.125059 kubelet[2096]: W0412 18:49:37.125040 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.125235 kubelet[2096]: E0412 18:49:37.125217 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.125651 kubelet[2096]: E0412 18:49:37.125632 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.125787 kubelet[2096]: W0412 18:49:37.125770 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.125874 kubelet[2096]: E0412 18:49:37.125864 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.126321 kubelet[2096]: E0412 18:49:37.126303 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.126451 kubelet[2096]: W0412 18:49:37.126432 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.126588 kubelet[2096]: E0412 18:49:37.126573 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.127144 kubelet[2096]: E0412 18:49:37.127051 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.127283 kubelet[2096]: W0412 18:49:37.127263 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.127398 kubelet[2096]: E0412 18:49:37.127384 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.128200 kubelet[2096]: E0412 18:49:37.128180 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.128335 kubelet[2096]: W0412 18:49:37.128318 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.128467 kubelet[2096]: E0412 18:49:37.128454 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.130125 kubelet[2096]: E0412 18:49:37.129181 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.130125 kubelet[2096]: W0412 18:49:37.129199 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.130125 kubelet[2096]: E0412 18:49:37.129225 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.130125 kubelet[2096]: E0412 18:49:37.129565 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.130125 kubelet[2096]: W0412 18:49:37.129577 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.130125 kubelet[2096]: E0412 18:49:37.129595 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.130817 kubelet[2096]: E0412 18:49:37.130777 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.130913 kubelet[2096]: W0412 18:49:37.130816 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.130913 kubelet[2096]: E0412 18:49:37.130856 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.131369 kubelet[2096]: E0412 18:49:37.131203 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.131369 kubelet[2096]: W0412 18:49:37.131221 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.131369 kubelet[2096]: E0412 18:49:37.131242 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.131853 kubelet[2096]: E0412 18:49:37.131829 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.131853 kubelet[2096]: W0412 18:49:37.131851 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.132038 kubelet[2096]: E0412 18:49:37.132021 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.132396 kubelet[2096]: E0412 18:49:37.132375 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.132507 kubelet[2096]: W0412 18:49:37.132396 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.132591 kubelet[2096]: E0412 18:49:37.132544 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.132890 kubelet[2096]: E0412 18:49:37.132871 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.132890 kubelet[2096]: W0412 18:49:37.132888 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.133047 kubelet[2096]: E0412 18:49:37.133026 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.133423 kubelet[2096]: E0412 18:49:37.133397 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.133423 kubelet[2096]: W0412 18:49:37.133420 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.133590 kubelet[2096]: E0412 18:49:37.133448 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.134018 kubelet[2096]: E0412 18:49:37.133885 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.134018 kubelet[2096]: W0412 18:49:37.133900 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.134191 kubelet[2096]: E0412 18:49:37.134025 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.134526 kubelet[2096]: E0412 18:49:37.134503 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.134526 kubelet[2096]: W0412 18:49:37.134523 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.134711 kubelet[2096]: E0412 18:49:37.134684 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.135001 kubelet[2096]: E0412 18:49:37.134980 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.135001 kubelet[2096]: W0412 18:49:37.134999 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.135215 kubelet[2096]: E0412 18:49:37.135198 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.135562 kubelet[2096]: E0412 18:49:37.135539 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.135652 kubelet[2096]: W0412 18:49:37.135563 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.135652 kubelet[2096]: E0412 18:49:37.135590 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.136120 kubelet[2096]: E0412 18:49:37.135963 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.136120 kubelet[2096]: W0412 18:49:37.135978 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.136291 kubelet[2096]: E0412 18:49:37.136180 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.136960 kubelet[2096]: E0412 18:49:37.136921 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.136960 kubelet[2096]: W0412 18:49:37.136959 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.137270 kubelet[2096]: E0412 18:49:37.137024 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.137795 kubelet[2096]: E0412 18:49:37.137751 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.137795 kubelet[2096]: W0412 18:49:37.137783 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.138261 kubelet[2096]: E0412 18:49:37.138231 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.141233 kubelet[2096]: E0412 18:49:37.141197 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.141233 kubelet[2096]: W0412 18:49:37.141226 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.142160 kubelet[2096]: E0412 18:49:37.142103 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.143414 kubelet[2096]: E0412 18:49:37.143388 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.143414 kubelet[2096]: W0412 18:49:37.143412 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.143567 kubelet[2096]: E0412 18:49:37.143443 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.147291 kubelet[2096]: E0412 18:49:37.147254 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.147291 kubelet[2096]: W0412 18:49:37.147286 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.147499 kubelet[2096]: E0412 18:49:37.147450 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.147750 kubelet[2096]: E0412 18:49:37.147708 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.147750 kubelet[2096]: W0412 18:49:37.147730 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.147890 kubelet[2096]: E0412 18:49:37.147758 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.148678 kubelet[2096]: E0412 18:49:37.148653 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.148678 kubelet[2096]: W0412 18:49:37.148674 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.148929 kubelet[2096]: E0412 18:49:37.148701 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.149131 kubelet[2096]: E0412 18:49:37.149112 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.149131 kubelet[2096]: W0412 18:49:37.149131 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.149274 kubelet[2096]: E0412 18:49:37.149159 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.236400 kubelet[2096]: E0412 18:49:37.236360 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.236400 kubelet[2096]: W0412 18:49:37.236392 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.236704 kubelet[2096]: E0412 18:49:37.236423 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.236813 kubelet[2096]: E0412 18:49:37.236791 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.236883 kubelet[2096]: W0412 18:49:37.236813 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.236883 kubelet[2096]: E0412 18:49:37.236834 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.237195 kubelet[2096]: E0412 18:49:37.237173 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.237195 kubelet[2096]: W0412 18:49:37.237193 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.237382 kubelet[2096]: E0412 18:49:37.237212 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.237529 kubelet[2096]: E0412 18:49:37.237507 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.237529 kubelet[2096]: W0412 18:49:37.237527 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.237663 kubelet[2096]: E0412 18:49:37.237546 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.237931 kubelet[2096]: E0412 18:49:37.237911 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.237931 kubelet[2096]: W0412 18:49:37.237930 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.238131 kubelet[2096]: E0412 18:49:37.237949 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.238297 kubelet[2096]: E0412 18:49:37.238275 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.238373 kubelet[2096]: W0412 18:49:37.238300 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.238373 kubelet[2096]: E0412 18:49:37.238320 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.339247 kubelet[2096]: E0412 18:49:37.339114 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.339247 kubelet[2096]: W0412 18:49:37.339139 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.339247 kubelet[2096]: E0412 18:49:37.339168 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.339560 kubelet[2096]: E0412 18:49:37.339550 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.339620 kubelet[2096]: W0412 18:49:37.339565 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.339620 kubelet[2096]: E0412 18:49:37.339588 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.339884 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.344112 kubelet[2096]: W0412 18:49:37.339899 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.339918 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.340231 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.344112 kubelet[2096]: W0412 18:49:37.340243 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.340273 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.340556 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.344112 kubelet[2096]: W0412 18:49:37.340568 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.340585 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.344112 kubelet[2096]: E0412 18:49:37.340866 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.344711 kubelet[2096]: W0412 18:49:37.340879 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.344711 kubelet[2096]: E0412 18:49:37.340896 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.441859 kubelet[2096]: E0412 18:49:37.441798 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.441859 kubelet[2096]: W0412 18:49:37.441830 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.441859 kubelet[2096]: E0412 18:49:37.441861 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.442277 kubelet[2096]: E0412 18:49:37.442218 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.442277 kubelet[2096]: W0412 18:49:37.442232 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.442277 kubelet[2096]: E0412 18:49:37.442252 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.442593 kubelet[2096]: E0412 18:49:37.442565 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.442593 kubelet[2096]: W0412 18:49:37.442588 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.442749 kubelet[2096]: E0412 18:49:37.442612 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.442963 kubelet[2096]: E0412 18:49:37.442932 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.442963 kubelet[2096]: W0412 18:49:37.442954 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.443117 kubelet[2096]: E0412 18:49:37.442974 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.443309 kubelet[2096]: E0412 18:49:37.443285 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.443309 kubelet[2096]: W0412 18:49:37.443306 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.443469 kubelet[2096]: E0412 18:49:37.443326 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.443639 kubelet[2096]: E0412 18:49:37.443615 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.443639 kubelet[2096]: W0412 18:49:37.443638 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.443771 kubelet[2096]: E0412 18:49:37.443658 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.544690 kubelet[2096]: E0412 18:49:37.544657 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.544962 kubelet[2096]: W0412 18:49:37.544923 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.545111 kubelet[2096]: E0412 18:49:37.545077 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.545544 kubelet[2096]: E0412 18:49:37.545527 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.545678 kubelet[2096]: W0412 18:49:37.545662 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.545774 kubelet[2096]: E0412 18:49:37.545762 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.546149 kubelet[2096]: E0412 18:49:37.546132 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.546282 kubelet[2096]: W0412 18:49:37.546267 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.546382 kubelet[2096]: E0412 18:49:37.546369 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.546752 kubelet[2096]: E0412 18:49:37.546739 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.546862 kubelet[2096]: W0412 18:49:37.546848 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.546953 kubelet[2096]: E0412 18:49:37.546941 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.547347 kubelet[2096]: E0412 18:49:37.547333 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.547468 kubelet[2096]: W0412 18:49:37.547454 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.547568 kubelet[2096]: E0412 18:49:37.547547 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.547916 kubelet[2096]: E0412 18:49:37.547904 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.548011 kubelet[2096]: W0412 18:49:37.547997 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.548128 kubelet[2096]: E0412 18:49:37.548115 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.565013 kubelet[2096]: E0412 18:49:37.564989 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.565227 kubelet[2096]: W0412 18:49:37.565206 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.565340 kubelet[2096]: E0412 18:49:37.565325 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.576539 kubelet[2096]: E0412 18:49:37.576514 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.576710 kubelet[2096]: W0412 18:49:37.576689 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.576832 kubelet[2096]: E0412 18:49:37.576815 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.586853 kubelet[2096]: E0412 18:49:37.586821 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.587042 kubelet[2096]: W0412 18:49:37.587020 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.587212 kubelet[2096]: E0412 18:49:37.587194 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.649385 kubelet[2096]: E0412 18:49:37.649241 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.649973 kubelet[2096]: W0412 18:49:37.649947 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.650127 kubelet[2096]: E0412 18:49:37.650107 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.653278 kubelet[2096]: E0412 18:49:37.653258 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.653444 kubelet[2096]: W0412 18:49:37.653423 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.653607 kubelet[2096]: E0412 18:49:37.653553 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.654042 kubelet[2096]: E0412 18:49:37.654023 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.654210 kubelet[2096]: W0412 18:49:37.654190 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.654336 kubelet[2096]: E0412 18:49:37.654317 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.755352 kubelet[2096]: E0412 18:49:37.755314 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.755352 kubelet[2096]: W0412 18:49:37.755341 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.755685 kubelet[2096]: E0412 18:49:37.755383 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.756004 kubelet[2096]: E0412 18:49:37.755982 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.756004 kubelet[2096]: W0412 18:49:37.756001 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.756218 kubelet[2096]: E0412 18:49:37.756022 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.756992 kubelet[2096]: E0412 18:49:37.756969 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.756992 kubelet[2096]: W0412 18:49:37.756991 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.757202 kubelet[2096]: E0412 18:49:37.757012 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.788000 audit[2525]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:37.788000 audit[2525]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe8c5fd8e0 a2=0 a3=7ffe8c5fd8cc items=0 ppid=2235 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:37.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:37.813000 audit[2525]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2525 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:37.813000 audit[2525]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8c5fd8e0 a2=0 a3=0 items=0 ppid=2235 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:37.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:37.817393 kubelet[2096]: E0412 18:49:37.817360 2096 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Apr 12 18:49:37.817651 kubelet[2096]: E0412 18:49:37.817629 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-typha-certs podName:e6369fdc-45ef-46ee-a4a9-e8045e17c74f nodeName:}" failed. No retries permitted until 2024-04-12 18:49:38.317591834 +0000 UTC m=+21.541283570 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-typha-certs") pod "calico-typha-5b944cffcb-c4xrh" (UID: "e6369fdc-45ef-46ee-a4a9-e8045e17c74f") : failed to sync secret cache: timed out waiting for the condition Apr 12 18:49:37.817997 kubelet[2096]: E0412 18:49:37.817978 2096 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:37.818196 kubelet[2096]: E0412 18:49:37.818179 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-tigera-ca-bundle podName:e6369fdc-45ef-46ee-a4a9-e8045e17c74f nodeName:}" failed. No retries permitted until 2024-04-12 18:49:38.31815955 +0000 UTC m=+21.541851257 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/e6369fdc-45ef-46ee-a4a9-e8045e17c74f-tigera-ca-bundle") pod "calico-typha-5b944cffcb-c4xrh" (UID: "e6369fdc-45ef-46ee-a4a9-e8045e17c74f") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:37.858141 kubelet[2096]: E0412 18:49:37.858107 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.858351 kubelet[2096]: W0412 18:49:37.858329 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.858479 kubelet[2096]: E0412 18:49:37.858462 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.859836 kubelet[2096]: E0412 18:49:37.859814 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.860059 kubelet[2096]: W0412 18:49:37.860039 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.860194 kubelet[2096]: E0412 18:49:37.860179 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.862037 kubelet[2096]: E0412 18:49:37.862017 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.862193 kubelet[2096]: W0412 18:49:37.862175 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.862302 kubelet[2096]: E0412 18:49:37.862289 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.963958 kubelet[2096]: E0412 18:49:37.963836 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.964224 kubelet[2096]: W0412 18:49:37.964198 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.964433 kubelet[2096]: E0412 18:49:37.964365 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.967121 kubelet[2096]: E0412 18:49:37.967100 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.967263 kubelet[2096]: W0412 18:49:37.967243 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.967422 kubelet[2096]: E0412 18:49:37.967378 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:37.967866 kubelet[2096]: E0412 18:49:37.967847 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:37.968019 kubelet[2096]: W0412 18:49:37.968001 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:37.968156 kubelet[2096]: E0412 18:49:37.968139 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.021855 kubelet[2096]: E0412 18:49:38.021773 2096 configmap.go:199] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:38.022406 kubelet[2096]: E0412 18:49:38.022376 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-tigera-ca-bundle podName:c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392 nodeName:}" failed. No retries permitted until 2024-04-12 18:49:38.522338512 +0000 UTC m=+21.746030230 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392-tigera-ca-bundle") pod "calico-node-jkz4t" (UID: "c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:38.069891 kubelet[2096]: E0412 18:49:38.069851 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.069891 kubelet[2096]: W0412 18:49:38.069882 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.070205 kubelet[2096]: E0412 18:49:38.069912 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.070376 kubelet[2096]: E0412 18:49:38.070354 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.070376 kubelet[2096]: W0412 18:49:38.070374 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.070501 kubelet[2096]: E0412 18:49:38.070395 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.070759 kubelet[2096]: E0412 18:49:38.070738 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.070759 kubelet[2096]: W0412 18:49:38.070756 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.070924 kubelet[2096]: E0412 18:49:38.070785 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.172108 kubelet[2096]: E0412 18:49:38.172065 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.172330 kubelet[2096]: W0412 18:49:38.172308 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.172481 kubelet[2096]: E0412 18:49:38.172463 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.172960 kubelet[2096]: E0412 18:49:38.172942 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.173098 kubelet[2096]: W0412 18:49:38.173067 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.173211 kubelet[2096]: E0412 18:49:38.173196 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.173664 kubelet[2096]: E0412 18:49:38.173645 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.173815 kubelet[2096]: W0412 18:49:38.173797 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.173944 kubelet[2096]: E0412 18:49:38.173930 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.274903 kubelet[2096]: E0412 18:49:38.274865 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.274903 kubelet[2096]: W0412 18:49:38.274891 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.275229 kubelet[2096]: E0412 18:49:38.274925 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.275357 kubelet[2096]: E0412 18:49:38.275338 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.275357 kubelet[2096]: W0412 18:49:38.275356 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.275501 kubelet[2096]: E0412 18:49:38.275376 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.275848 kubelet[2096]: E0412 18:49:38.275824 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.275848 kubelet[2096]: W0412 18:49:38.275842 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.276006 kubelet[2096]: E0412 18:49:38.275863 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.376898 kubelet[2096]: E0412 18:49:38.376860 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.376898 kubelet[2096]: W0412 18:49:38.376889 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.377211 kubelet[2096]: E0412 18:49:38.376921 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.377520 kubelet[2096]: E0412 18:49:38.377497 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.377520 kubelet[2096]: W0412 18:49:38.377516 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.377777 kubelet[2096]: E0412 18:49:38.377545 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.378220 kubelet[2096]: E0412 18:49:38.378199 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.378358 kubelet[2096]: W0412 18:49:38.378224 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.378358 kubelet[2096]: E0412 18:49:38.378252 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.378708 kubelet[2096]: E0412 18:49:38.378689 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.378708 kubelet[2096]: W0412 18:49:38.378706 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.378886 kubelet[2096]: E0412 18:49:38.378733 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.379239 kubelet[2096]: E0412 18:49:38.379210 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.379239 kubelet[2096]: W0412 18:49:38.379237 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.379398 kubelet[2096]: E0412 18:49:38.379381 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.379895 kubelet[2096]: E0412 18:49:38.379872 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.379895 kubelet[2096]: W0412 18:49:38.379892 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.380126 kubelet[2096]: E0412 18:49:38.379920 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.380421 kubelet[2096]: E0412 18:49:38.380402 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.380421 kubelet[2096]: W0412 18:49:38.380419 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.380576 kubelet[2096]: E0412 18:49:38.380445 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.380955 kubelet[2096]: E0412 18:49:38.380924 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.380955 kubelet[2096]: W0412 18:49:38.380953 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.381617 kubelet[2096]: E0412 18:49:38.381593 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.381984 kubelet[2096]: E0412 18:49:38.381964 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.381984 kubelet[2096]: W0412 18:49:38.381982 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.382177 kubelet[2096]: E0412 18:49:38.382009 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.382540 kubelet[2096]: E0412 18:49:38.382520 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.382540 kubelet[2096]: W0412 18:49:38.382540 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.382734 kubelet[2096]: E0412 18:49:38.382565 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.383175 kubelet[2096]: E0412 18:49:38.383157 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.383444 kubelet[2096]: W0412 18:49:38.383425 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.383662 kubelet[2096]: E0412 18:49:38.383645 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.384914 kubelet[2096]: E0412 18:49:38.384887 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.384914 kubelet[2096]: W0412 18:49:38.384911 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.385464 kubelet[2096]: E0412 18:49:38.384932 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.397353 kubelet[2096]: E0412 18:49:38.397223 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.397353 kubelet[2096]: W0412 18:49:38.397244 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.397353 kubelet[2096]: E0412 18:49:38.397268 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.460428 env[1151]: time="2024-04-12T18:49:38.460354448Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b944cffcb-c4xrh,Uid:e6369fdc-45ef-46ee-a4a9-e8045e17c74f,Namespace:calico-system,Attempt:0,}" Apr 12 18:49:38.479514 kubelet[2096]: E0412 18:49:38.479475 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.479514 kubelet[2096]: W0412 18:49:38.479507 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.479817 kubelet[2096]: E0412 18:49:38.479540 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.488984 env[1151]: time="2024-04-12T18:49:38.488872604Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:38.489252 env[1151]: time="2024-04-12T18:49:38.488970175Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:38.489252 env[1151]: time="2024-04-12T18:49:38.489025308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:38.489547 env[1151]: time="2024-04-12T18:49:38.489403303Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90cc838db79e36b3f7f0ba4581ea2147db99642cc083a2bcb54dd13d4dbcf5cf pid=2563 runtime=io.containerd.runc.v2 Apr 12 18:49:38.518438 systemd[1]: Started cri-containerd-90cc838db79e36b3f7f0ba4581ea2147db99642cc083a2bcb54dd13d4dbcf5cf.scope. Apr 12 18:49:38.522514 systemd[1]: run-containerd-runc-k8s.io-90cc838db79e36b3f7f0ba4581ea2147db99642cc083a2bcb54dd13d4dbcf5cf-runc.SWXr4M.mount: Deactivated successfully. Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.553000 audit: BPF prog-id=130 op=LOAD Apr 12 18:49:38.555000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.555000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636338333864623739653336623366376630626134353831656132 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636338333864623739653336623366376630626134353831656132 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.556000 audit: BPF prog-id=131 op=LOAD Apr 12 18:49:38.556000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002add10 items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636338333864623739653336623366376630626134353831656132 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.558000 audit: BPF prog-id=132 op=LOAD Apr 12 18:49:38.558000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002add58 items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636338333864623739653336623366376630626134353831656132 Apr 12 18:49:38.559000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:49:38.559000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { perfmon } for pid=2573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit[2573]: AVC avc: denied { bpf } for pid=2573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.559000 audit: BPF prog-id=133 op=LOAD Apr 12 18:49:38.559000 audit[2573]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00032e168 items=0 ppid=2563 pid=2573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930636338333864623739653336623366376630626134353831656132 Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.580866 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.583357 kubelet[2096]: W0412 18:49:38.580890 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.580918 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.581273 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.583357 kubelet[2096]: W0412 18:49:38.581286 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.581304 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.581535 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.583357 kubelet[2096]: W0412 18:49:38.581544 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.581561 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.583357 kubelet[2096]: E0412 18:49:38.581782 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.583970 kubelet[2096]: W0412 18:49:38.581792 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.583970 kubelet[2096]: E0412 18:49:38.581808 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.583970 kubelet[2096]: E0412 18:49:38.582076 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.583970 kubelet[2096]: W0412 18:49:38.582104 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.583970 kubelet[2096]: E0412 18:49:38.582122 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.583970 kubelet[2096]: E0412 18:49:38.583281 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:38.583970 kubelet[2096]: W0412 18:49:38.583295 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:38.583970 kubelet[2096]: E0412 18:49:38.583314 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:38.611284 env[1151]: time="2024-04-12T18:49:38.611227678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b944cffcb-c4xrh,Uid:e6369fdc-45ef-46ee-a4a9-e8045e17c74f,Namespace:calico-system,Attempt:0,} returns sandbox id \"90cc838db79e36b3f7f0ba4581ea2147db99642cc083a2bcb54dd13d4dbcf5cf\"" Apr 12 18:49:38.613557 env[1151]: time="2024-04-12T18:49:38.613515563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:49:38.642806 env[1151]: time="2024-04-12T18:49:38.642762463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jkz4t,Uid:c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392,Namespace:calico-system,Attempt:0,}" Apr 12 18:49:38.664602 env[1151]: time="2024-04-12T18:49:38.664497150Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:49:38.664602 env[1151]: time="2024-04-12T18:49:38.664557699Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:49:38.664602 env[1151]: time="2024-04-12T18:49:38.664576117Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:49:38.665192 env[1151]: time="2024-04-12T18:49:38.665120710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00 pid=2608 runtime=io.containerd.runc.v2 Apr 12 18:49:38.687097 systemd[1]: Started cri-containerd-af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00.scope. Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.717000 audit: BPF prog-id=134 op=LOAD Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2608 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336430383161366333313632346632383239623061323662663538 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2608 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336430383161366333313632346632383239623061323662663538 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit: BPF prog-id=135 op=LOAD Apr 12 18:49:38.719000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000335a50 items=0 ppid=2608 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336430383161366333313632346632383239623061323662663538 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit: BPF prog-id=136 op=LOAD Apr 12 18:49:38.719000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000335a98 items=0 ppid=2608 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336430383161366333313632346632383239623061323662663538 Apr 12 18:49:38.719000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:49:38.719000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:38.719000 audit: BPF prog-id=137 op=LOAD Apr 12 18:49:38.719000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000335ea8 items=0 ppid=2608 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:38.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166336430383161366333313632346632383239623061323662663538 Apr 12 18:49:38.744413 env[1151]: time="2024-04-12T18:49:38.744359167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jkz4t,Uid:c593f3d0-a68f-4d3b-a4fd-ebb2d31a5392,Namespace:calico-system,Attempt:0,} returns sandbox id \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\"" Apr 12 18:49:39.020116 kubelet[2096]: E0412 18:49:39.018295 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:39.455142 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3834841053.mount: Deactivated successfully. Apr 12 18:49:41.019994 kubelet[2096]: E0412 18:49:41.019951 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:41.093117 env[1151]: time="2024-04-12T18:49:41.093036659Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:41.097730 env[1151]: time="2024-04-12T18:49:41.097685551Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:41.102971 env[1151]: time="2024-04-12T18:49:41.102914545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:41.107372 env[1151]: time="2024-04-12T18:49:41.106222299Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:41.108620 env[1151]: time="2024-04-12T18:49:41.108571757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:49:41.113042 env[1151]: time="2024-04-12T18:49:41.111660760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:49:41.137040 env[1151]: time="2024-04-12T18:49:41.136997208Z" level=info msg="CreateContainer within sandbox \"90cc838db79e36b3f7f0ba4581ea2147db99642cc083a2bcb54dd13d4dbcf5cf\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:49:41.174862 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3694845361.mount: Deactivated successfully. Apr 12 18:49:41.181709 env[1151]: time="2024-04-12T18:49:41.181624811Z" level=info msg="CreateContainer within sandbox \"90cc838db79e36b3f7f0ba4581ea2147db99642cc083a2bcb54dd13d4dbcf5cf\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e45d515f86ee5688529e149d012d18366dd0bd8a047549441fe23b98bb158b92\"" Apr 12 18:49:41.182556 env[1151]: time="2024-04-12T18:49:41.182500233Z" level=info msg="StartContainer for \"e45d515f86ee5688529e149d012d18366dd0bd8a047549441fe23b98bb158b92\"" Apr 12 18:49:41.214030 systemd[1]: Started cri-containerd-e45d515f86ee5688529e149d012d18366dd0bd8a047549441fe23b98bb158b92.scope. Apr 12 18:49:41.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.259000 audit: BPF prog-id=138 op=LOAD Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2563 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:41.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534356435313566383665653536383835323965313439643031326431 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2563 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:41.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534356435313566383665653536383835323965313439643031326431 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.260000 audit: BPF prog-id=139 op=LOAD Apr 12 18:49:41.260000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030ad50 items=0 ppid=2563 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:41.260000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534356435313566383665653536383835323965313439643031326431 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.262000 audit: BPF prog-id=140 op=LOAD Apr 12 18:49:41.262000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030ad98 items=0 ppid=2563 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:41.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534356435313566383665653536383835323965313439643031326431 Apr 12 18:49:41.263000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:49:41.263000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { perfmon } for pid=2652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit[2652]: AVC avc: denied { bpf } for pid=2652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:41.263000 audit: BPF prog-id=141 op=LOAD Apr 12 18:49:41.263000 audit[2652]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030b1a8 items=0 ppid=2563 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:41.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534356435313566383665653536383835323965313439643031326431 Apr 12 18:49:41.328548 env[1151]: time="2024-04-12T18:49:41.325317937Z" level=info msg="StartContainer for \"e45d515f86ee5688529e149d012d18366dd0bd8a047549441fe23b98bb158b92\" returns successfully" Apr 12 18:49:42.143917 kubelet[2096]: E0412 18:49:42.143730 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.143917 kubelet[2096]: W0412 18:49:42.143761 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.143917 kubelet[2096]: E0412 18:49:42.143788 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.145001 kubelet[2096]: E0412 18:49:42.144828 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.145001 kubelet[2096]: W0412 18:49:42.144844 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.145001 kubelet[2096]: E0412 18:49:42.144865 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.145539 kubelet[2096]: E0412 18:49:42.145327 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.145539 kubelet[2096]: W0412 18:49:42.145343 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.145539 kubelet[2096]: E0412 18:49:42.145363 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.145983 kubelet[2096]: E0412 18:49:42.145831 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.145983 kubelet[2096]: W0412 18:49:42.145848 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.145983 kubelet[2096]: E0412 18:49:42.145868 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.146505 kubelet[2096]: E0412 18:49:42.146352 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.146505 kubelet[2096]: W0412 18:49:42.146367 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.146505 kubelet[2096]: E0412 18:49:42.146388 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.147031 kubelet[2096]: E0412 18:49:42.146808 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.147031 kubelet[2096]: W0412 18:49:42.146824 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.147031 kubelet[2096]: E0412 18:49:42.146843 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.147459 kubelet[2096]: E0412 18:49:42.147366 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.147459 kubelet[2096]: W0412 18:49:42.147381 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.147459 kubelet[2096]: E0412 18:49:42.147402 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.150920 kubelet[2096]: E0412 18:49:42.148914 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.151142 kubelet[2096]: W0412 18:49:42.151119 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.151287 kubelet[2096]: E0412 18:49:42.151269 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.152808 kubelet[2096]: E0412 18:49:42.152789 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.152945 kubelet[2096]: W0412 18:49:42.152926 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.153074 kubelet[2096]: E0412 18:49:42.153060 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.153529 kubelet[2096]: E0412 18:49:42.153512 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.153658 kubelet[2096]: W0412 18:49:42.153642 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.153767 kubelet[2096]: E0412 18:49:42.153753 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.154428 kubelet[2096]: E0412 18:49:42.154408 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.154564 kubelet[2096]: W0412 18:49:42.154547 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.154681 kubelet[2096]: E0412 18:49:42.154668 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.155184 kubelet[2096]: E0412 18:49:42.155166 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.155343 kubelet[2096]: W0412 18:49:42.155325 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.155458 kubelet[2096]: E0412 18:49:42.155443 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.206899 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.208529 kubelet[2096]: W0412 18:49:42.206928 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.206957 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.207428 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.208529 kubelet[2096]: W0412 18:49:42.207442 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.207468 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.207838 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.208529 kubelet[2096]: W0412 18:49:42.207852 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.207876 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.208529 kubelet[2096]: E0412 18:49:42.208228 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.209240 kubelet[2096]: W0412 18:49:42.208242 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.209240 kubelet[2096]: E0412 18:49:42.208267 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.209637 kubelet[2096]: E0412 18:49:42.209440 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.209637 kubelet[2096]: W0412 18:49:42.209457 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.209637 kubelet[2096]: E0412 18:49:42.209604 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.210144 kubelet[2096]: E0412 18:49:42.209926 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.210144 kubelet[2096]: W0412 18:49:42.209943 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.210144 kubelet[2096]: E0412 18:49:42.210076 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.210630 kubelet[2096]: E0412 18:49:42.210431 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.210630 kubelet[2096]: W0412 18:49:42.210446 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.210630 kubelet[2096]: E0412 18:49:42.210585 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.211499 kubelet[2096]: E0412 18:49:42.210949 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.211499 kubelet[2096]: W0412 18:49:42.210964 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.211499 kubelet[2096]: E0412 18:49:42.210990 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.211499 kubelet[2096]: E0412 18:49:42.211381 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.211499 kubelet[2096]: W0412 18:49:42.211395 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.212132 kubelet[2096]: E0412 18:49:42.211849 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.212321 kubelet[2096]: E0412 18:49:42.212305 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.212555 kubelet[2096]: W0412 18:49:42.212421 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.212697 kubelet[2096]: E0412 18:49:42.212678 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.212866 kubelet[2096]: E0412 18:49:42.212851 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.213149 kubelet[2096]: W0412 18:49:42.212955 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.213307 kubelet[2096]: E0412 18:49:42.213288 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.213479 kubelet[2096]: E0412 18:49:42.213465 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.213741 kubelet[2096]: W0412 18:49:42.213576 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.213741 kubelet[2096]: E0412 18:49:42.213607 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.213984 kubelet[2096]: E0412 18:49:42.213969 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.214285 kubelet[2096]: W0412 18:49:42.214076 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.214285 kubelet[2096]: E0412 18:49:42.214128 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.214553 kubelet[2096]: E0412 18:49:42.214538 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.214681 kubelet[2096]: W0412 18:49:42.214665 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.214932 kubelet[2096]: E0412 18:49:42.214912 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.215503 kubelet[2096]: E0412 18:49:42.215489 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.215599 kubelet[2096]: W0412 18:49:42.215586 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.215695 kubelet[2096]: E0412 18:49:42.215685 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.217017 kubelet[2096]: E0412 18:49:42.216998 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.217165 kubelet[2096]: W0412 18:49:42.217145 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.217309 kubelet[2096]: E0412 18:49:42.217293 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.217735 kubelet[2096]: E0412 18:49:42.217717 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.217860 kubelet[2096]: W0412 18:49:42.217844 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.217970 kubelet[2096]: E0412 18:49:42.217957 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.218794 kubelet[2096]: E0412 18:49:42.218776 2096 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:49:42.218947 kubelet[2096]: W0412 18:49:42.218928 2096 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:49:42.219066 kubelet[2096]: E0412 18:49:42.219053 2096 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:49:42.563707 env[1151]: time="2024-04-12T18:49:42.563635054Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:42.567197 env[1151]: time="2024-04-12T18:49:42.567136657Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:42.571105 env[1151]: time="2024-04-12T18:49:42.571035839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:42.574303 env[1151]: time="2024-04-12T18:49:42.574256418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:42.576025 env[1151]: time="2024-04-12T18:49:42.575968432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:49:42.581823 env[1151]: time="2024-04-12T18:49:42.581775734Z" level=info msg="CreateContainer within sandbox \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:49:42.602639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2542392517.mount: Deactivated successfully. Apr 12 18:49:42.608141 env[1151]: time="2024-04-12T18:49:42.608054110Z" level=info msg="CreateContainer within sandbox \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d\"" Apr 12 18:49:42.611126 env[1151]: time="2024-04-12T18:49:42.608861765Z" level=info msg="StartContainer for \"1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d\"" Apr 12 18:49:42.648116 systemd[1]: Started cri-containerd-1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d.scope. Apr 12 18:49:42.703375 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:49:42.703622 kernel: audit: type=1400 audit(1712947782.676:1037): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9b5f42a0a8 items=0 ppid=2608 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:42.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363661616664653163646263316531616533316632663231666432 Apr 12 18:49:42.765440 kernel: audit: type=1300 audit(1712947782.676:1037): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9b5f42a0a8 items=0 ppid=2608 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:42.765630 kernel: audit: type=1327 audit(1712947782.676:1037): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363661616664653163646263316531616533316632663231666432 Apr 12 18:49:42.765680 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788125 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.829264 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.867115 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.870910 env[1151]: time="2024-04-12T18:49:42.870861925Z" level=info msg="StartContainer for \"1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d\" returns successfully" Apr 12 18:49:42.890123 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.915632 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.915762 kernel: audit: type=1400 audit(1712947782.676:1038): avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.913790 systemd[1]: cri-containerd-1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d.scope: Deactivated successfully. Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.676000 audit: BPF prog-id=142 op=LOAD Apr 12 18:49:42.676000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8f18 items=0 ppid=2608 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:42.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363661616664653163646263316531616533316632663231666432 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.738000 audit: BPF prog-id=143 op=LOAD Apr 12 18:49:42.738000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8f68 items=0 ppid=2608 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:42.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363661616664653163646263316531616533316632663231666432 Apr 12 18:49:42.788000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:49:42.788000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { perfmon } for pid=2720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit[2720]: AVC avc: denied { bpf } for pid=2720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:42.788000 audit: BPF prog-id=144 op=LOAD Apr 12 18:49:42.788000 audit[2720]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8ff8 items=0 ppid=2608 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:42.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161363661616664653163646263316531616533316632663231666432 Apr 12 18:49:42.936000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:49:43.018120 kubelet[2096]: E0412 18:49:43.017532 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:43.122385 systemd[1]: run-containerd-runc-k8s.io-1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d-runc.FTGzzl.mount: Deactivated successfully. Apr 12 18:49:43.181564 kubelet[2096]: I0412 18:49:43.126970 2096 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:49:43.181564 kubelet[2096]: I0412 18:49:43.147498 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5b944cffcb-c4xrh" podStartSLOduration=4.650463551 podCreationTimestamp="2024-04-12 18:49:36 +0000 UTC" firstStartedPulling="2024-04-12 18:49:38.613143243 +0000 UTC m=+21.836834958" lastFinishedPulling="2024-04-12 18:49:41.11012695 +0000 UTC m=+24.333818660" observedRunningTime="2024-04-12 18:49:42.143007341 +0000 UTC m=+25.366699066" watchObservedRunningTime="2024-04-12 18:49:43.147447253 +0000 UTC m=+26.371138978" Apr 12 18:49:43.122543 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d-rootfs.mount: Deactivated successfully. Apr 12 18:49:43.523271 env[1151]: time="2024-04-12T18:49:43.523202252Z" level=info msg="shim disconnected" id=1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d Apr 12 18:49:43.523271 env[1151]: time="2024-04-12T18:49:43.523271706Z" level=warning msg="cleaning up after shim disconnected" id=1a66aafde1cdbc1e1ae31f2f21fd2022f956a3b7e1a3a47198ee1d7824b6863d namespace=k8s.io Apr 12 18:49:43.523743 env[1151]: time="2024-04-12T18:49:43.523287960Z" level=info msg="cleaning up dead shim" Apr 12 18:49:43.534402 env[1151]: time="2024-04-12T18:49:43.534343403Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:49:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2763 runtime=io.containerd.runc.v2\n" Apr 12 18:49:44.132016 env[1151]: time="2024-04-12T18:49:44.131962767Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:49:44.871648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2042550155.mount: Deactivated successfully. Apr 12 18:49:45.018922 kubelet[2096]: E0412 18:49:45.018509 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:46.160036 kubelet[2096]: I0412 18:49:46.159997 2096 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:49:46.470000 audit[2777]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:46.470000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff683eb2e0 a2=0 a3=7fff683eb2cc items=0 ppid=2235 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:46.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:46.472000 audit[2777]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:49:46.472000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff683eb2e0 a2=0 a3=7fff683eb2cc items=0 ppid=2235 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:46.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:49:47.020911 kubelet[2096]: E0412 18:49:47.020866 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:48.454009 env[1151]: time="2024-04-12T18:49:48.453939986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:48.457054 env[1151]: time="2024-04-12T18:49:48.457009915Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:48.459695 env[1151]: time="2024-04-12T18:49:48.459653889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:48.461977 env[1151]: time="2024-04-12T18:49:48.461938231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:48.463042 env[1151]: time="2024-04-12T18:49:48.462987659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:49:48.466989 env[1151]: time="2024-04-12T18:49:48.466940980Z" level=info msg="CreateContainer within sandbox \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:49:48.488569 env[1151]: time="2024-04-12T18:49:48.488514277Z" level=info msg="CreateContainer within sandbox \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0\"" Apr 12 18:49:48.490866 env[1151]: time="2024-04-12T18:49:48.489395981Z" level=info msg="StartContainer for \"8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0\"" Apr 12 18:49:48.532232 systemd[1]: run-containerd-runc-k8s.io-8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0-runc.Ezzvah.mount: Deactivated successfully. Apr 12 18:49:48.537508 systemd[1]: Started cri-containerd-8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0.scope. Apr 12 18:49:48.570869 kernel: kauditd_printk_skb: 40 callbacks suppressed Apr 12 18:49:48.571031 kernel: audit: type=1400 audit(1712947788.564:1046): avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.564000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.564000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7b88a25e18 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:48.624732 kernel: audit: type=1300 audit(1712947788.564:1046): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7b88a25e18 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:48.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865666532346265393566323463636238376436663131396330366435 Apr 12 18:49:48.654341 kernel: audit: type=1327 audit(1712947788.564:1046): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865666532346265393566323463636238376436663131396330366435 Apr 12 18:49:48.654555 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.702315 env[1151]: time="2024-04-12T18:49:48.702258174Z" level=info msg="StartContainer for \"8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0\" returns successfully" Apr 12 18:49:48.718010 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.718158 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.742432 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.788008 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.788188 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.788240 kernel: audit: type=1400 audit(1712947788.570:1047): avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.570000 audit: BPF prog-id=145 op=LOAD Apr 12 18:49:48.570000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000098828 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:48.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865666532346265393566323463636238376436663131396330366435 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit: BPF prog-id=146 op=LOAD Apr 12 18:49:48.623000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098878 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:48.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865666532346265393566323463636238376436663131396330366435 Apr 12 18:49:48.623000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:49:48.623000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { perfmon } for pid=2786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit[2786]: AVC avc: denied { bpf } for pid=2786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:48.623000 audit: BPF prog-id=147 op=LOAD Apr 12 18:49:48.623000 audit[2786]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098908 items=0 ppid=2608 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:48.623000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865666532346265393566323463636238376436663131396330366435 Apr 12 18:49:49.020170 kubelet[2096]: E0412 18:49:49.020124 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:49.387481 env[1151]: time="2024-04-12T18:49:49.387304651Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:49:49.390142 systemd[1]: cri-containerd-8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0.scope: Deactivated successfully. Apr 12 18:49:49.396000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:49:49.421785 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0-rootfs.mount: Deactivated successfully. Apr 12 18:49:49.429363 kubelet[2096]: I0412 18:49:49.429317 2096 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:49:49.459867 kubelet[2096]: I0412 18:49:49.459821 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:49.466672 kubelet[2096]: W0412 18:49:49.466641 2096 reflector.go:533] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:49.466936 kubelet[2096]: E0412 18:49:49.466916 2096 reflector.go:148] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:49:49.468552 systemd[1]: Created slice kubepods-burstable-pod8baca578_0051_43e1_aef2_da7984cea493.slice. Apr 12 18:49:49.470911 kubelet[2096]: I0412 18:49:49.470882 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:49.471345 kubelet[2096]: I0412 18:49:49.471318 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:49:49.485638 systemd[1]: Created slice kubepods-besteffort-pod280c510f_472a_4d01_ae7f_f3ff53c90be7.slice. Apr 12 18:49:49.496438 systemd[1]: Created slice kubepods-burstable-pod5bfd61b9_ab1f_4cc2_9921_0ab44331baa5.slice. Apr 12 18:49:49.600970 kubelet[2096]: I0412 18:49:49.600907 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jxtt2\" (UniqueName: \"kubernetes.io/projected/8baca578-0051-43e1-aef2-da7984cea493-kube-api-access-jxtt2\") pod \"coredns-5d78c9869d-2rr9w\" (UID: \"8baca578-0051-43e1-aef2-da7984cea493\") " pod="kube-system/coredns-5d78c9869d-2rr9w" Apr 12 18:49:49.600970 kubelet[2096]: I0412 18:49:49.600979 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/280c510f-472a-4d01-ae7f-f3ff53c90be7-tigera-ca-bundle\") pod \"calico-kube-controllers-dbf47c6c7-hshf6\" (UID: \"280c510f-472a-4d01-ae7f-f3ff53c90be7\") " pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" Apr 12 18:49:49.601314 kubelet[2096]: I0412 18:49:49.601022 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9qwkv\" (UniqueName: \"kubernetes.io/projected/280c510f-472a-4d01-ae7f-f3ff53c90be7-kube-api-access-9qwkv\") pod \"calico-kube-controllers-dbf47c6c7-hshf6\" (UID: \"280c510f-472a-4d01-ae7f-f3ff53c90be7\") " pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" Apr 12 18:49:49.601314 kubelet[2096]: I0412 18:49:49.601062 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8baca578-0051-43e1-aef2-da7984cea493-config-volume\") pod \"coredns-5d78c9869d-2rr9w\" (UID: \"8baca578-0051-43e1-aef2-da7984cea493\") " pod="kube-system/coredns-5d78c9869d-2rr9w" Apr 12 18:49:49.601314 kubelet[2096]: I0412 18:49:49.601116 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5bfd61b9-ab1f-4cc2-9921-0ab44331baa5-config-volume\") pod \"coredns-5d78c9869d-rstg6\" (UID: \"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5\") " pod="kube-system/coredns-5d78c9869d-rstg6" Apr 12 18:49:49.601314 kubelet[2096]: I0412 18:49:49.601189 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kj2g5\" (UniqueName: \"kubernetes.io/projected/5bfd61b9-ab1f-4cc2-9921-0ab44331baa5-kube-api-access-kj2g5\") pod \"coredns-5d78c9869d-rstg6\" (UID: \"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5\") " pod="kube-system/coredns-5d78c9869d-rstg6" Apr 12 18:49:49.793430 env[1151]: time="2024-04-12T18:49:49.793375627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbf47c6c7-hshf6,Uid:280c510f-472a-4d01-ae7f-f3ff53c90be7,Namespace:calico-system,Attempt:0,}" Apr 12 18:49:50.130980 env[1151]: time="2024-04-12T18:49:50.130826955Z" level=info msg="shim disconnected" id=8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0 Apr 12 18:49:50.130980 env[1151]: time="2024-04-12T18:49:50.130888108Z" level=warning msg="cleaning up after shim disconnected" id=8efe24be95f24ccb87d6f119c06d5c87e73395bcd48ea967c193b31fb74ebbf0 namespace=k8s.io Apr 12 18:49:50.130980 env[1151]: time="2024-04-12T18:49:50.130902927Z" level=info msg="cleaning up dead shim" Apr 12 18:49:50.160574 env[1151]: time="2024-04-12T18:49:50.160506450Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:49:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2826 runtime=io.containerd.runc.v2\n" Apr 12 18:49:50.230501 env[1151]: time="2024-04-12T18:49:50.230409188Z" level=error msg="Failed to destroy network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:50.231033 env[1151]: time="2024-04-12T18:49:50.230979790Z" level=error msg="encountered an error cleaning up failed sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:50.231176 env[1151]: time="2024-04-12T18:49:50.231066365Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbf47c6c7-hshf6,Uid:280c510f-472a-4d01-ae7f-f3ff53c90be7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:50.231540 kubelet[2096]: E0412 18:49:50.231496 2096 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:50.234151 kubelet[2096]: E0412 18:49:50.231573 2096 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" Apr 12 18:49:50.234151 kubelet[2096]: E0412 18:49:50.231612 2096 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" Apr 12 18:49:50.234151 kubelet[2096]: E0412 18:49:50.231698 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-dbf47c6c7-hshf6_calico-system(280c510f-472a-4d01-ae7f-f3ff53c90be7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-dbf47c6c7-hshf6_calico-system(280c510f-472a-4d01-ae7f-f3ff53c90be7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" podUID=280c510f-472a-4d01-ae7f-f3ff53c90be7 Apr 12 18:49:50.703063 kubelet[2096]: E0412 18:49:50.703002 2096 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:50.703310 kubelet[2096]: E0412 18:49:50.703153 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/5bfd61b9-ab1f-4cc2-9921-0ab44331baa5-config-volume podName:5bfd61b9-ab1f-4cc2-9921-0ab44331baa5 nodeName:}" failed. No retries permitted until 2024-04-12 18:49:51.203125598 +0000 UTC m=+34.426817319 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/5bfd61b9-ab1f-4cc2-9921-0ab44331baa5-config-volume") pod "coredns-5d78c9869d-rstg6" (UID: "5bfd61b9-ab1f-4cc2-9921-0ab44331baa5") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:50.703551 kubelet[2096]: E0412 18:49:50.703525 2096 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:50.703656 kubelet[2096]: E0412 18:49:50.703591 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/8baca578-0051-43e1-aef2-da7984cea493-config-volume podName:8baca578-0051-43e1-aef2-da7984cea493 nodeName:}" failed. No retries permitted until 2024-04-12 18:49:51.203572538 +0000 UTC m=+34.427264246 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/8baca578-0051-43e1-aef2-da7984cea493-config-volume") pod "coredns-5d78c9869d-2rr9w" (UID: "8baca578-0051-43e1-aef2-da7984cea493") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:49:50.721155 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090-shm.mount: Deactivated successfully. Apr 12 18:49:51.025159 systemd[1]: Created slice kubepods-besteffort-pod4ac34cc8_3435_448d_b1fb_84732b25d8cb.slice. Apr 12 18:49:51.028494 env[1151]: time="2024-04-12T18:49:51.028448295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fskrn,Uid:4ac34cc8-3435-448d-b1fb-84732b25d8cb,Namespace:calico-system,Attempt:0,}" Apr 12 18:49:51.112608 env[1151]: time="2024-04-12T18:49:51.112503524Z" level=error msg="Failed to destroy network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.115996 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f-shm.mount: Deactivated successfully. Apr 12 18:49:51.118046 env[1151]: time="2024-04-12T18:49:51.117987103Z" level=error msg="encountered an error cleaning up failed sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.118196 env[1151]: time="2024-04-12T18:49:51.118079932Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fskrn,Uid:4ac34cc8-3435-448d-b1fb-84732b25d8cb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.118507 kubelet[2096]: E0412 18:49:51.118462 2096 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.118633 kubelet[2096]: E0412 18:49:51.118539 2096 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:51.118633 kubelet[2096]: E0412 18:49:51.118593 2096 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fskrn" Apr 12 18:49:51.118772 kubelet[2096]: E0412 18:49:51.118724 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fskrn_calico-system(4ac34cc8-3435-448d-b1fb-84732b25d8cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fskrn_calico-system(4ac34cc8-3435-448d-b1fb-84732b25d8cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:51.162692 env[1151]: time="2024-04-12T18:49:51.160582164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:49:51.162919 kubelet[2096]: I0412 18:49:51.162474 2096 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:49:51.168113 env[1151]: time="2024-04-12T18:49:51.164564318Z" level=info msg="StopPodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\"" Apr 12 18:49:51.168113 env[1151]: time="2024-04-12T18:49:51.167672498Z" level=info msg="StopPodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\"" Apr 12 18:49:51.168331 kubelet[2096]: I0412 18:49:51.167049 2096 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:49:51.239573 env[1151]: time="2024-04-12T18:49:51.239495369Z" level=error msg="StopPodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" failed" error="failed to destroy network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.240546 kubelet[2096]: E0412 18:49:51.240207 2096 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:49:51.240546 kubelet[2096]: E0412 18:49:51.240296 2096 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f} Apr 12 18:49:51.240546 kubelet[2096]: E0412 18:49:51.240378 2096 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:49:51.240546 kubelet[2096]: E0412 18:49:51.240468 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4ac34cc8-3435-448d-b1fb-84732b25d8cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fskrn" podUID=4ac34cc8-3435-448d-b1fb-84732b25d8cb Apr 12 18:49:51.248750 env[1151]: time="2024-04-12T18:49:51.248662029Z" level=error msg="StopPodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" failed" error="failed to destroy network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.249119 kubelet[2096]: E0412 18:49:51.249073 2096 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:49:51.249254 kubelet[2096]: E0412 18:49:51.249143 2096 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090} Apr 12 18:49:51.249254 kubelet[2096]: E0412 18:49:51.249201 2096 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"280c510f-472a-4d01-ae7f-f3ff53c90be7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:49:51.249254 kubelet[2096]: E0412 18:49:51.249244 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"280c510f-472a-4d01-ae7f-f3ff53c90be7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" podUID=280c510f-472a-4d01-ae7f-f3ff53c90be7 Apr 12 18:49:51.274316 env[1151]: time="2024-04-12T18:49:51.274245973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-2rr9w,Uid:8baca578-0051-43e1-aef2-da7984cea493,Namespace:kube-system,Attempt:0,}" Apr 12 18:49:51.303851 env[1151]: time="2024-04-12T18:49:51.302434332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rstg6,Uid:5bfd61b9-ab1f-4cc2-9921-0ab44331baa5,Namespace:kube-system,Attempt:0,}" Apr 12 18:49:51.382590 env[1151]: time="2024-04-12T18:49:51.382518950Z" level=error msg="Failed to destroy network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.383319 env[1151]: time="2024-04-12T18:49:51.383259513Z" level=error msg="encountered an error cleaning up failed sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.383466 env[1151]: time="2024-04-12T18:49:51.383344342Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-2rr9w,Uid:8baca578-0051-43e1-aef2-da7984cea493,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.383687 kubelet[2096]: E0412 18:49:51.383658 2096 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.383805 kubelet[2096]: E0412 18:49:51.383732 2096 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-2rr9w" Apr 12 18:49:51.383805 kubelet[2096]: E0412 18:49:51.383768 2096 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-2rr9w" Apr 12 18:49:51.383948 kubelet[2096]: E0412 18:49:51.383841 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-2rr9w_kube-system(8baca578-0051-43e1-aef2-da7984cea493)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-2rr9w_kube-system(8baca578-0051-43e1-aef2-da7984cea493)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-2rr9w" podUID=8baca578-0051-43e1-aef2-da7984cea493 Apr 12 18:49:51.412604 env[1151]: time="2024-04-12T18:49:51.412501193Z" level=error msg="Failed to destroy network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.413034 env[1151]: time="2024-04-12T18:49:51.412942257Z" level=error msg="encountered an error cleaning up failed sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.413184 env[1151]: time="2024-04-12T18:49:51.413021258Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rstg6,Uid:5bfd61b9-ab1f-4cc2-9921-0ab44331baa5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.413370 kubelet[2096]: E0412 18:49:51.413336 2096 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:51.413493 kubelet[2096]: E0412 18:49:51.413419 2096 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-rstg6" Apr 12 18:49:51.413493 kubelet[2096]: E0412 18:49:51.413458 2096 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-rstg6" Apr 12 18:49:51.413617 kubelet[2096]: E0412 18:49:51.413528 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-rstg6_kube-system(5bfd61b9-ab1f-4cc2-9921-0ab44331baa5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-rstg6_kube-system(5bfd61b9-ab1f-4cc2-9921-0ab44331baa5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rstg6" podUID=5bfd61b9-ab1f-4cc2-9921-0ab44331baa5 Apr 12 18:49:51.721620 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91-shm.mount: Deactivated successfully. Apr 12 18:49:52.171105 kubelet[2096]: I0412 18:49:52.171037 2096 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:49:52.174665 env[1151]: time="2024-04-12T18:49:52.174617664Z" level=info msg="StopPodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\"" Apr 12 18:49:52.201379 kubelet[2096]: I0412 18:49:52.201339 2096 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:49:52.204556 env[1151]: time="2024-04-12T18:49:52.204510340Z" level=info msg="StopPodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\"" Apr 12 18:49:52.296397 env[1151]: time="2024-04-12T18:49:52.296295213Z" level=error msg="StopPodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" failed" error="failed to destroy network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:52.297024 kubelet[2096]: E0412 18:49:52.296762 2096 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:49:52.297024 kubelet[2096]: E0412 18:49:52.296836 2096 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7} Apr 12 18:49:52.297024 kubelet[2096]: E0412 18:49:52.296919 2096 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:49:52.297024 kubelet[2096]: E0412 18:49:52.296990 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rstg6" podUID=5bfd61b9-ab1f-4cc2-9921-0ab44331baa5 Apr 12 18:49:52.315314 env[1151]: time="2024-04-12T18:49:52.315242862Z" level=error msg="StopPodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" failed" error="failed to destroy network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:49:52.316056 kubelet[2096]: E0412 18:49:52.315820 2096 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:49:52.316056 kubelet[2096]: E0412 18:49:52.315890 2096 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91} Apr 12 18:49:52.316056 kubelet[2096]: E0412 18:49:52.315971 2096 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8baca578-0051-43e1-aef2-da7984cea493\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:49:52.316056 kubelet[2096]: E0412 18:49:52.316016 2096 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8baca578-0051-43e1-aef2-da7984cea493\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-2rr9w" podUID=8baca578-0051-43e1-aef2-da7984cea493 Apr 12 18:49:57.353293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751880317.mount: Deactivated successfully. Apr 12 18:49:57.414452 env[1151]: time="2024-04-12T18:49:57.414381411Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:57.417312 env[1151]: time="2024-04-12T18:49:57.417265881Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:57.419857 env[1151]: time="2024-04-12T18:49:57.419817207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:57.421918 env[1151]: time="2024-04-12T18:49:57.421869753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:49:57.422743 env[1151]: time="2024-04-12T18:49:57.422692947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:49:57.446994 env[1151]: time="2024-04-12T18:49:57.446938963Z" level=info msg="CreateContainer within sandbox \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:49:57.469566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1550952427.mount: Deactivated successfully. Apr 12 18:49:57.476662 env[1151]: time="2024-04-12T18:49:57.476593560Z" level=info msg="CreateContainer within sandbox \"af3d081a6c31624f2829b0a26bf585e3bc5c8875b619395c08102b887b2d5d00\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab\"" Apr 12 18:49:57.479229 env[1151]: time="2024-04-12T18:49:57.477473102Z" level=info msg="StartContainer for \"7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab\"" Apr 12 18:49:57.503349 systemd[1]: Started cri-containerd-7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab.scope. Apr 12 18:49:57.561398 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:49:57.561579 kernel: audit: type=1400 audit(1712947797.534:1053): avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2b2883bcc8 items=0 ppid=2608 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:57.594594 kernel: audit: type=1300 audit(1712947797.534:1053): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f2b2883bcc8 items=0 ppid=2608 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:57.594761 kernel: audit: type=1327 audit(1712947797.534:1053): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366435636663373866613565363034643538346666343865326636 Apr 12 18:49:57.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366435636663373866613565363034643538346666343865326636 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.666209 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.666358 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.666413 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.666767 env[1151]: time="2024-04-12T18:49:57.666712118Z" level=info msg="StartContainer for \"7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab\" returns successfully" Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.731905 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.732074 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.732137 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.780521 kernel: audit: type=1400 audit(1712947797.534:1054): avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.534000 audit: BPF prog-id=148 op=LOAD Apr 12 18:49:57.534000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000284c88 items=0 ppid=2608 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:57.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366435636663373866613565363034643538346666343865326636 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit: BPF prog-id=149 op=LOAD Apr 12 18:49:57.560000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000284cd8 items=0 ppid=2608 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:57.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366435636663373866613565363034643538346666343865326636 Apr 12 18:49:57.560000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:49:57.560000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { perfmon } for pid=3060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit[3060]: AVC avc: denied { bpf } for pid=3060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:57.560000 audit: BPF prog-id=150 op=LOAD Apr 12 18:49:57.560000 audit[3060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000284d68 items=0 ppid=2608 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:57.560000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763366435636663373866613565363034643538346666343865326636 Apr 12 18:49:57.845006 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:49:57.845237 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:49:58.254427 kubelet[2096]: I0412 18:49:58.254364 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-jkz4t" podStartSLOduration=3.577838815 podCreationTimestamp="2024-04-12 18:49:36 +0000 UTC" firstStartedPulling="2024-04-12 18:49:38.746606678 +0000 UTC m=+21.970298380" lastFinishedPulling="2024-04-12 18:49:57.42306879 +0000 UTC m=+40.646760507" observedRunningTime="2024-04-12 18:49:58.25274638 +0000 UTC m=+41.476438104" watchObservedRunningTime="2024-04-12 18:49:58.254300942 +0000 UTC m=+41.477992672" Apr 12 18:49:59.248412 systemd[1]: run-containerd-runc-k8s.io-7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab-runc.nMlzk7.mount: Deactivated successfully. Apr 12 18:49:59.411000 audit[3209]: AVC avc: denied { write } for pid=3209 comm="tee" name="fd" dev="proc" ino=24704 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.413000 audit[3210]: AVC avc: denied { write } for pid=3210 comm="tee" name="fd" dev="proc" ino=24707 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.411000 audit[3209]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce6f13931 a2=241 a3=1b6 items=1 ppid=3172 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.411000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:49:59.411000 audit: PATH item=0 name="/dev/fd/63" inode=24687 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.411000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.413000 audit[3210]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2bc4b932 a2=241 a3=1b6 items=1 ppid=3167 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.413000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:49:59.413000 audit: PATH item=0 name="/dev/fd/63" inode=24686 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.437000 audit[3217]: AVC avc: denied { write } for pid=3217 comm="tee" name="fd" dev="proc" ino=24716 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.444000 audit[3221]: AVC avc: denied { write } for pid=3221 comm="tee" name="fd" dev="proc" ino=24050 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.444000 audit[3221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8e26a922 a2=241 a3=1b6 items=1 ppid=3170 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.444000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:49:59.444000 audit: PATH item=0 name="/dev/fd/63" inode=24698 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.444000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.446000 audit[3223]: AVC avc: denied { write } for pid=3223 comm="tee" name="fd" dev="proc" ino=24727 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.437000 audit[3217]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff388ee933 a2=241 a3=1b6 items=1 ppid=3166 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.437000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:49:59.437000 audit: PATH item=0 name="/dev/fd/63" inode=24694 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.437000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.453000 audit[3229]: AVC avc: denied { write } for pid=3229 comm="tee" name="fd" dev="proc" ino=24053 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.453000 audit[3229]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7500e921 a2=241 a3=1b6 items=1 ppid=3164 pid=3229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.453000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:49:59.453000 audit: PATH item=0 name="/dev/fd/63" inode=24708 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.453000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.463000 audit[3219]: AVC avc: denied { write } for pid=3219 comm="tee" name="fd" dev="proc" ino=24730 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:49:59.463000 audit[3219]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6d47a931 a2=241 a3=1b6 items=1 ppid=3171 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.463000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:49:59.463000 audit: PATH item=0 name="/dev/fd/63" inode=24695 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.463000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.446000 audit[3223]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff06a5f931 a2=241 a3=1b6 items=1 ppid=3175 pid=3223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.446000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:49:59.446000 audit: PATH item=0 name="/dev/fd/63" inode=24701 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:49:59.446000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.958000 audit: BPF prog-id=151 op=LOAD Apr 12 18:49:59.958000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6726afe0 a2=70 a3=7fe1d4fd2000 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.959000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit: BPF prog-id=152 op=LOAD Apr 12 18:49:59.959000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6726afe0 a2=70 a3=6f items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.959000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe6726af90 a2=70 a3=7ffe6726afe0 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit: BPF prog-id=153 op=LOAD Apr 12 18:49:59.959000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe6726af70 a2=70 a3=7ffe6726afe0 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.959000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6726b050 a2=70 a3=0 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6726b040 a2=70 a3=0 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.959000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.959000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6726afb0 a2=70 a3=0 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.959000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.960000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.960000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe6726b080 a2=70 a3=106fe10 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.960000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe6726b080 a2=70 a3=106c880 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { perfmon } for pid=3303 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit[3303]: AVC avc: denied { bpf } for pid=3303 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.961000 audit: BPF prog-id=154 op=LOAD Apr 12 18:49:59.961000 audit[3303]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6726afa0 a2=70 a3=0 items=0 ppid=3174 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.961000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:49:59.969000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.969000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff516b6f30 a2=70 a3=fff80800 items=0 ppid=3174 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.969000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:49:59.969000 audit[3306]: AVC avc: denied { bpf } for pid=3306 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:49:59.969000 audit[3306]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff516b6e00 a2=70 a3=3 items=0 ppid=3174 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:49:59.969000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:49:59.978000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:50:00.069000 audit[3329]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:00.069000 audit[3329]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd4fe84b30 a2=0 a3=7ffd4fe84b1c items=0 ppid=3174 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:00.069000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:00.088000 audit[3331]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3331 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:00.088000 audit[3331]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffcf1d0ebe0 a2=0 a3=7ffcf1d0ebcc items=0 ppid=3174 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:00.088000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:00.091000 audit[3330]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3330 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:00.091000 audit[3330]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdaea7f1c0 a2=0 a3=7ffdaea7f1ac items=0 ppid=3174 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:00.091000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:00.094000 audit[3336]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3336 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:00.094000 audit[3336]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffa7304220 a2=0 a3=7fffa730420c items=0 ppid=3174 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:00.094000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:00.764719 systemd-networkd[1034]: vxlan.calico: Link UP Apr 12 18:50:00.764734 systemd-networkd[1034]: vxlan.calico: Gained carrier Apr 12 18:50:02.696379 systemd-networkd[1034]: vxlan.calico: Gained IPv6LL Apr 12 18:50:03.019726 env[1151]: time="2024-04-12T18:50:03.019661777Z" level=info msg="StopPodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\"" Apr 12 18:50:03.021261 env[1151]: time="2024-04-12T18:50:03.020366777Z" level=info msg="StopPodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\"" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.105 [INFO][3381] k8s.go 585: Cleaning up netns ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.105 [INFO][3381] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" iface="eth0" netns="/var/run/netns/cni-9f4210a3-741f-9572-00ac-711487ee3135" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.105 [INFO][3381] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" iface="eth0" netns="/var/run/netns/cni-9f4210a3-741f-9572-00ac-711487ee3135" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.106 [INFO][3381] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" iface="eth0" netns="/var/run/netns/cni-9f4210a3-741f-9572-00ac-711487ee3135" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.106 [INFO][3381] k8s.go 592: Releasing IP address(es) ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.106 [INFO][3381] utils.go 188: Calico CNI releasing IP address ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.155 [INFO][3392] ipam_plugin.go 415: Releasing address using handleID ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.155 [INFO][3392] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.156 [INFO][3392] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.165 [WARNING][3392] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.165 [INFO][3392] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.167 [INFO][3392] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:03.175399 env[1151]: 2024-04-12 18:50:03.169 [INFO][3381] k8s.go 598: Teardown processing complete. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:03.180590 env[1151]: time="2024-04-12T18:50:03.179776423Z" level=info msg="TearDown network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" successfully" Apr 12 18:50:03.180590 env[1151]: time="2024-04-12T18:50:03.179833076Z" level=info msg="StopPodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" returns successfully" Apr 12 18:50:03.179335 systemd[1]: run-netns-cni\x2d9f4210a3\x2d741f\x2d9572\x2d00ac\x2d711487ee3135.mount: Deactivated successfully. Apr 12 18:50:03.182414 env[1151]: time="2024-04-12T18:50:03.181779803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rstg6,Uid:5bfd61b9-ab1f-4cc2-9921-0ab44331baa5,Namespace:kube-system,Attempt:1,}" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.113 [INFO][3376] k8s.go 585: Cleaning up netns ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.113 [INFO][3376] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" iface="eth0" netns="/var/run/netns/cni-03452287-1eb1-f493-1a25-5f91a0f2e3f8" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.114 [INFO][3376] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" iface="eth0" netns="/var/run/netns/cni-03452287-1eb1-f493-1a25-5f91a0f2e3f8" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.114 [INFO][3376] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" iface="eth0" netns="/var/run/netns/cni-03452287-1eb1-f493-1a25-5f91a0f2e3f8" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.114 [INFO][3376] k8s.go 592: Releasing IP address(es) ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.114 [INFO][3376] utils.go 188: Calico CNI releasing IP address ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.156 [INFO][3396] ipam_plugin.go 415: Releasing address using handleID ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.156 [INFO][3396] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.167 [INFO][3396] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.187 [WARNING][3396] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.187 [INFO][3396] ipam_plugin.go 443: Releasing address using workloadID ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.189 [INFO][3396] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:03.196274 env[1151]: 2024-04-12 18:50:03.192 [INFO][3376] k8s.go 598: Teardown processing complete. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:03.211437 env[1151]: time="2024-04-12T18:50:03.211387881Z" level=info msg="TearDown network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" successfully" Apr 12 18:50:03.211653 env[1151]: time="2024-04-12T18:50:03.211622859Z" level=info msg="StopPodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" returns successfully" Apr 12 18:50:03.215812 env[1151]: time="2024-04-12T18:50:03.215076935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fskrn,Uid:4ac34cc8-3435-448d-b1fb-84732b25d8cb,Namespace:calico-system,Attempt:1,}" Apr 12 18:50:03.215500 systemd[1]: run-netns-cni\x2d03452287\x2d1eb1\x2df493\x2d1a25\x2d5f91a0f2e3f8.mount: Deactivated successfully. Apr 12 18:50:03.421203 systemd-networkd[1034]: cali2403f0c0af4: Link UP Apr 12 18:50:03.428215 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:50:03.440172 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2403f0c0af4: link becomes ready Apr 12 18:50:03.441857 systemd-networkd[1034]: cali2403f0c0af4: Gained carrier Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.303 [INFO][3414] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0 csi-node-driver- calico-system 4ac34cc8-3435-448d-b1fb-84732b25d8cb 700 0 2024-04-12 18:49:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal csi-node-driver-fskrn eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali2403f0c0af4 [] []}} ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.303 [INFO][3414] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.363 [INFO][3428] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" HandleID="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.380 [INFO][3428] ipam_plugin.go 268: Auto assigning IP ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" HandleID="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051f20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", "pod":"csi-node-driver-fskrn", "timestamp":"2024-04-12 18:50:03.363819399 +0000 UTC"}, Hostname:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.380 [INFO][3428] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.380 [INFO][3428] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.380 [INFO][3428] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.384 [INFO][3428] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.391 [INFO][3428] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.397 [INFO][3428] ipam.go 489: Trying affinity for 192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.399 [INFO][3428] ipam.go 155: Attempting to load block cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.402 [INFO][3428] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.402 [INFO][3428] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.0/26 handle="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.404 [INFO][3428] ipam.go 1682: Creating new handle: k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852 Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.409 [INFO][3428] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.0/26 handle="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.415 [INFO][3428] ipam.go 1216: Successfully claimed IPs: [192.168.98.1/26] block=192.168.98.0/26 handle="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.415 [INFO][3428] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.1/26] handle="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.415 [INFO][3428] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:03.468794 env[1151]: 2024-04-12 18:50:03.415 [INFO][3428] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.1/26] IPv6=[] ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" HandleID="k8s-pod-network.c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.470174 env[1151]: 2024-04-12 18:50:03.419 [INFO][3414] k8s.go 385: Populated endpoint ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4ac34cc8-3435-448d-b1fb-84732b25d8cb", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-fskrn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2403f0c0af4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:03.470174 env[1151]: 2024-04-12 18:50:03.419 [INFO][3414] k8s.go 386: Calico CNI using IPs: [192.168.98.1/32] ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.470174 env[1151]: 2024-04-12 18:50:03.419 [INFO][3414] dataplane_linux.go 68: Setting the host side veth name to cali2403f0c0af4 ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.470174 env[1151]: 2024-04-12 18:50:03.442 [INFO][3414] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.470174 env[1151]: 2024-04-12 18:50:03.443 [INFO][3414] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4ac34cc8-3435-448d-b1fb-84732b25d8cb", ResourceVersion:"700", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852", Pod:"csi-node-driver-fskrn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2403f0c0af4", MAC:"62:63:08:01:b6:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:03.470174 env[1151]: 2024-04-12 18:50:03.466 [INFO][3414] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852" Namespace="calico-system" Pod="csi-node-driver-fskrn" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:03.499273 env[1151]: time="2024-04-12T18:50:03.498654539Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:50:03.499273 env[1151]: time="2024-04-12T18:50:03.498859888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:50:03.499273 env[1151]: time="2024-04-12T18:50:03.498936271Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:50:03.499690 env[1151]: time="2024-04-12T18:50:03.499266737Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852 pid=3457 runtime=io.containerd.runc.v2 Apr 12 18:50:03.511884 systemd-networkd[1034]: cali54b83e81520: Link UP Apr 12 18:50:03.520808 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali54b83e81520: link becomes ready Apr 12 18:50:03.526058 systemd-networkd[1034]: cali54b83e81520: Gained carrier Apr 12 18:50:03.554976 systemd[1]: Started cri-containerd-c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852.scope. Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.301 [INFO][3404] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0 coredns-5d78c9869d- kube-system 5bfd61b9-ab1f-4cc2-9921-0ab44331baa5 699 0 2024-04-12 18:49:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal coredns-5d78c9869d-rstg6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali54b83e81520 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.301 [INFO][3404] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.363 [INFO][3433] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" HandleID="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.380 [INFO][3433] ipam_plugin.go 268: Auto assigning IP ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" HandleID="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000260c80), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-rstg6", "timestamp":"2024-04-12 18:50:03.363819079 +0000 UTC"}, Hostname:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.381 [INFO][3433] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.415 [INFO][3433] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.415 [INFO][3433] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.417 [INFO][3433] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.440 [INFO][3433] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.466 [INFO][3433] ipam.go 489: Trying affinity for 192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.471 [INFO][3433] ipam.go 155: Attempting to load block cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.476 [INFO][3433] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.476 [INFO][3433] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.0/26 handle="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.479 [INFO][3433] ipam.go 1682: Creating new handle: k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5 Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.486 [INFO][3433] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.0/26 handle="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.498 [INFO][3433] ipam.go 1216: Successfully claimed IPs: [192.168.98.2/26] block=192.168.98.0/26 handle="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.498 [INFO][3433] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.2/26] handle="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.498 [INFO][3433] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:03.568149 env[1151]: 2024-04-12 18:50:03.498 [INFO][3433] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.2/26] IPv6=[] ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" HandleID="k8s-pod-network.69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.569661 env[1151]: 2024-04-12 18:50:03.502 [INFO][3404] k8s.go 385: Populated endpoint ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-rstg6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali54b83e81520", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:03.569661 env[1151]: 2024-04-12 18:50:03.502 [INFO][3404] k8s.go 386: Calico CNI using IPs: [192.168.98.2/32] ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.569661 env[1151]: 2024-04-12 18:50:03.502 [INFO][3404] dataplane_linux.go 68: Setting the host side veth name to cali54b83e81520 ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.569661 env[1151]: 2024-04-12 18:50:03.512 [INFO][3404] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.569661 env[1151]: 2024-04-12 18:50:03.533 [INFO][3404] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5", Pod:"coredns-5d78c9869d-rstg6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali54b83e81520", MAC:"ba:2d:de:a1:16:fa", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:03.569661 env[1151]: 2024-04-12 18:50:03.564 [INFO][3404] k8s.go 498: Wrote updated endpoint to datastore ContainerID="69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5" Namespace="kube-system" Pod="coredns-5d78c9869d-rstg6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:03.624640 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:50:03.624816 kernel: audit: type=1400 audit(1712947803.596:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.624996 env[1151]: time="2024-04-12T18:50:03.620159340Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:50:03.624996 env[1151]: time="2024-04-12T18:50:03.620317117Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:50:03.624996 env[1151]: time="2024-04-12T18:50:03.620386009Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:50:03.624996 env[1151]: time="2024-04-12T18:50:03.620760159Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5 pid=3509 runtime=io.containerd.runc.v2 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.649672 kernel: audit: type=1400 audit(1712947803.596:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.674218 kernel: audit: type=1400 audit(1712947803.596:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.701299 kernel: audit: type=1400 audit(1712947803.596:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.721554 env[1151]: time="2024-04-12T18:50:03.712982079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fskrn,Uid:4ac34cc8-3435-448d-b1fb-84732b25d8cb,Namespace:calico-system,Attempt:1,} returns sandbox id \"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852\"" Apr 12 18:50:03.721554 env[1151]: time="2024-04-12T18:50:03.718924563Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:50:03.726178 kernel: audit: type=1400 audit(1712947803.596:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.743590 systemd[1]: Started cri-containerd-69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5.scope. Apr 12 18:50:03.748129 kernel: audit: type=1400 audit(1712947803.596:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.806587 kernel: audit: type=1400 audit(1712947803.596:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.806738 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:50:03.806790 kernel: audit: type=1400 audit(1712947803.596:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.806824 kernel: audit: audit_lost=126 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.596000 audit: BPF prog-id=155 op=LOAD Apr 12 18:50:03.596000 audit[3504]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3504 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:03.596000 audit[3504]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffe378f5240 a2=0 a3=7ffe378f522c items=0 ppid=3174 pid=3504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.596000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:03.625000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.625000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3457 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330323439326533656533303661653036373461343861636138613365 Apr 12 18:50:03.625000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.625000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3457 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330323439326533656533303661653036373461343861636138613365 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit: BPF prog-id=156 op=LOAD Apr 12 18:50:03.626000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000294c00 items=0 ppid=3457 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330323439326533656533303661653036373461343861636138613365 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit: BPF prog-id=157 op=LOAD Apr 12 18:50:03.626000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000294c48 items=0 ppid=3457 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330323439326533656533303661653036373461343861636138613365 Apr 12 18:50:03.626000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:50:03.626000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.626000 audit: BPF prog-id=158 op=LOAD Apr 12 18:50:03.626000 audit[3469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000295058 items=0 ppid=3457 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330323439326533656533303661653036373461343861636138613365 Apr 12 18:50:03.667000 audit[3528]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3528 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:03.667000 audit[3528]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffdf407a510 a2=0 a3=7ffdf407a4fc items=0 ppid=3174 pid=3528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.667000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:03.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.812000 audit: BPF prog-id=159 op=LOAD Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3509 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663566643534303733333532666163326566326335636334306435 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3509 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663566643534303733333532666163326566326335636334306435 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit: BPF prog-id=160 op=LOAD Apr 12 18:50:03.813000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000388350 items=0 ppid=3509 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663566643534303733333532666163326566326335636334306435 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.813000 audit: BPF prog-id=161 op=LOAD Apr 12 18:50:03.813000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000388398 items=0 ppid=3509 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663566643534303733333532666163326566326335636334306435 Apr 12 18:50:03.814000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:50:03.814000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { perfmon } for pid=3521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit[3521]: AVC avc: denied { bpf } for pid=3521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.814000 audit: BPF prog-id=162 op=LOAD Apr 12 18:50:03.814000 audit[3521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003887a8 items=0 ppid=3509 pid=3521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639663566643534303733333532666163326566326335636334306435 Apr 12 18:50:03.856667 env[1151]: time="2024-04-12T18:50:03.855507745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rstg6,Uid:5bfd61b9-ab1f-4cc2-9921-0ab44331baa5,Namespace:kube-system,Attempt:1,} returns sandbox id \"69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5\"" Apr 12 18:50:03.860719 env[1151]: time="2024-04-12T18:50:03.860659761Z" level=info msg="CreateContainer within sandbox \"69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:50:03.876643 env[1151]: time="2024-04-12T18:50:03.876575021Z" level=info msg="CreateContainer within sandbox \"69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d52b521287e20dd596e3c5b3bd195b9e7c432d096a8a758d73c7947a5cc34554\"" Apr 12 18:50:03.877671 env[1151]: time="2024-04-12T18:50:03.877608900Z" level=info msg="StartContainer for \"d52b521287e20dd596e3c5b3bd195b9e7c432d096a8a758d73c7947a5cc34554\"" Apr 12 18:50:03.903673 systemd[1]: Started cri-containerd-d52b521287e20dd596e3c5b3bd195b9e7c432d096a8a758d73c7947a5cc34554.scope. Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.922000 audit: BPF prog-id=163 op=LOAD Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000151c48 a2=10 a3=1c items=0 ppid=3509 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326235323132383765323064643539366533633562336264313935 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001516b0 a2=3c a3=8 items=0 ppid=3509 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326235323132383765323064643539366533633562336264313935 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit: BPF prog-id=164 op=LOAD Apr 12 18:50:03.924000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001519d8 a2=78 a3=c00020ad10 items=0 ppid=3509 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326235323132383765323064643539366533633562336264313935 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit: BPF prog-id=165 op=LOAD Apr 12 18:50:03.924000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000151770 a2=78 a3=c00020ad58 items=0 ppid=3509 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326235323132383765323064643539366533633562336264313935 Apr 12 18:50:03.924000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:50:03.924000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { perfmon } for pid=3560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit[3560]: AVC avc: denied { bpf } for pid=3560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:03.924000 audit: BPF prog-id=166 op=LOAD Apr 12 18:50:03.924000 audit[3560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000151c30 a2=78 a3=c00020b168 items=0 ppid=3509 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:03.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435326235323132383765323064643539366533633562336264313935 Apr 12 18:50:03.959425 env[1151]: time="2024-04-12T18:50:03.952342581Z" level=info msg="StartContainer for \"d52b521287e20dd596e3c5b3bd195b9e7c432d096a8a758d73c7947a5cc34554\" returns successfully" Apr 12 18:50:04.019521 env[1151]: time="2024-04-12T18:50:04.019463715Z" level=info msg="StopPodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\"" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.089 [INFO][3604] k8s.go 585: Cleaning up netns ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.090 [INFO][3604] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" iface="eth0" netns="/var/run/netns/cni-208ee5a9-5e97-22f8-46ed-035c6ab90a73" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.091 [INFO][3604] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" iface="eth0" netns="/var/run/netns/cni-208ee5a9-5e97-22f8-46ed-035c6ab90a73" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.091 [INFO][3604] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" iface="eth0" netns="/var/run/netns/cni-208ee5a9-5e97-22f8-46ed-035c6ab90a73" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.091 [INFO][3604] k8s.go 592: Releasing IP address(es) ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.091 [INFO][3604] utils.go 188: Calico CNI releasing IP address ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.129 [INFO][3610] ipam_plugin.go 415: Releasing address using handleID ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.130 [INFO][3610] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.130 [INFO][3610] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.139 [WARNING][3610] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.139 [INFO][3610] ipam_plugin.go 443: Releasing address using workloadID ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.142 [INFO][3610] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:04.146708 env[1151]: 2024-04-12 18:50:04.144 [INFO][3604] k8s.go 598: Teardown processing complete. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:04.148019 env[1151]: time="2024-04-12T18:50:04.146905298Z" level=info msg="TearDown network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" successfully" Apr 12 18:50:04.148019 env[1151]: time="2024-04-12T18:50:04.146952243Z" level=info msg="StopPodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" returns successfully" Apr 12 18:50:04.148525 env[1151]: time="2024-04-12T18:50:04.148384698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-2rr9w,Uid:8baca578-0051-43e1-aef2-da7984cea493,Namespace:kube-system,Attempt:1,}" Apr 12 18:50:04.202159 systemd[1]: run-netns-cni\x2d208ee5a9\x2d5e97\x2d22f8\x2d46ed\x2d035c6ab90a73.mount: Deactivated successfully. Apr 12 18:50:04.299339 kubelet[2096]: I0412 18:50:04.299294 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-rstg6" podStartSLOduration=33.299242003 podCreationTimestamp="2024-04-12 18:49:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:50:04.274610749 +0000 UTC m=+47.498302474" watchObservedRunningTime="2024-04-12 18:50:04.299242003 +0000 UTC m=+47.522933724" Apr 12 18:50:04.346000 audit[3636]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:04.346000 audit[3636]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffdf10f4660 a2=0 a3=7ffdf10f464c items=0 ppid=2235 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.346000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:04.347000 audit[3636]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:04.347000 audit[3636]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdf10f4660 a2=0 a3=0 items=0 ppid=2235 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:04.363000 audit[3638]: NETFILTER_CFG table=filter:105 family=2 entries=11 op=nft_register_rule pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:04.363000 audit[3638]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffd47a4e40 a2=0 a3=7fffd47a4e2c items=0 ppid=2235 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:04.365000 audit[3638]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:04.365000 audit[3638]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffd47a4e40 a2=0 a3=7fffd47a4e2c items=0 ppid=2235 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.365000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:04.401486 systemd-networkd[1034]: cali69cd270ce9a: Link UP Apr 12 18:50:04.410275 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali69cd270ce9a: link becomes ready Apr 12 18:50:04.414573 systemd-networkd[1034]: cali69cd270ce9a: Gained carrier Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.249 [INFO][3616] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0 coredns-5d78c9869d- kube-system 8baca578-0051-43e1-aef2-da7984cea493 713 0 2024-04-12 18:49:31 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal coredns-5d78c9869d-2rr9w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali69cd270ce9a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.250 [INFO][3616] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.334 [INFO][3629] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" HandleID="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.357 [INFO][3629] ipam_plugin.go 268: Auto assigning IP ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" HandleID="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9f80), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", "pod":"coredns-5d78c9869d-2rr9w", "timestamp":"2024-04-12 18:50:04.334293137 +0000 UTC"}, Hostname:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.357 [INFO][3629] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.357 [INFO][3629] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.357 [INFO][3629] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.360 [INFO][3629] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.368 [INFO][3629] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.373 [INFO][3629] ipam.go 489: Trying affinity for 192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.376 [INFO][3629] ipam.go 155: Attempting to load block cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.380 [INFO][3629] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.380 [INFO][3629] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.0/26 handle="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.384 [INFO][3629] ipam.go 1682: Creating new handle: k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341 Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.388 [INFO][3629] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.0/26 handle="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.394 [INFO][3629] ipam.go 1216: Successfully claimed IPs: [192.168.98.3/26] block=192.168.98.0/26 handle="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.394 [INFO][3629] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.3/26] handle="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.394 [INFO][3629] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:04.434676 env[1151]: 2024-04-12 18:50:04.394 [INFO][3629] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.3/26] IPv6=[] ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" HandleID="k8s-pod-network.243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.435888 env[1151]: 2024-04-12 18:50:04.396 [INFO][3616] k8s.go 385: Populated endpoint ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8baca578-0051-43e1-aef2-da7984cea493", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5d78c9869d-2rr9w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69cd270ce9a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:04.435888 env[1151]: 2024-04-12 18:50:04.396 [INFO][3616] k8s.go 386: Calico CNI using IPs: [192.168.98.3/32] ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.435888 env[1151]: 2024-04-12 18:50:04.396 [INFO][3616] dataplane_linux.go 68: Setting the host side veth name to cali69cd270ce9a ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.435888 env[1151]: 2024-04-12 18:50:04.416 [INFO][3616] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.435888 env[1151]: 2024-04-12 18:50:04.420 [INFO][3616] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8baca578-0051-43e1-aef2-da7984cea493", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341", Pod:"coredns-5d78c9869d-2rr9w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69cd270ce9a", MAC:"02:80:19:7e:3b:70", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:04.435888 env[1151]: 2024-04-12 18:50:04.433 [INFO][3616] k8s.go 498: Wrote updated endpoint to datastore ContainerID="243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341" Namespace="kube-system" Pod="coredns-5d78c9869d-2rr9w" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:04.460940 env[1151]: time="2024-04-12T18:50:04.460860237Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:50:04.461237 env[1151]: time="2024-04-12T18:50:04.461186809Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:50:04.461459 env[1151]: time="2024-04-12T18:50:04.461409915Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:50:04.461812 env[1151]: time="2024-04-12T18:50:04.461768957Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341 pid=3661 runtime=io.containerd.runc.v2 Apr 12 18:50:04.491000 audit[3677]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3677 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:04.497463 systemd[1]: Started cri-containerd-243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341.scope. Apr 12 18:50:04.491000 audit[3677]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffc74383320 a2=0 a3=7ffc7438330c items=0 ppid=3174 pid=3677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.491000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:04.515625 systemd[1]: run-containerd-runc-k8s.io-243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341-runc.JgCMpT.mount: Deactivated successfully. Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.539000 audit: BPF prog-id=167 op=LOAD Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3661 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234336461646631666232653763396665646337363861666533303263 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3661 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234336461646631666232653763396665646337363861666533303263 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit: BPF prog-id=168 op=LOAD Apr 12 18:50:04.540000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002a0530 items=0 ppid=3661 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234336461646631666232653763396665646337363861666533303263 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit: BPF prog-id=169 op=LOAD Apr 12 18:50:04.540000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002a0578 items=0 ppid=3661 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234336461646631666232653763396665646337363861666533303263 Apr 12 18:50:04.540000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:50:04.540000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { perfmon } for pid=3671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit[3671]: AVC avc: denied { bpf } for pid=3671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.540000 audit: BPF prog-id=170 op=LOAD Apr 12 18:50:04.540000 audit[3671]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002a0988 items=0 ppid=3661 pid=3671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234336461646631666232653763396665646337363861666533303263 Apr 12 18:50:04.551842 systemd-networkd[1034]: cali2403f0c0af4: Gained IPv6LL Apr 12 18:50:04.592945 env[1151]: time="2024-04-12T18:50:04.592861942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-2rr9w,Uid:8baca578-0051-43e1-aef2-da7984cea493,Namespace:kube-system,Attempt:1,} returns sandbox id \"243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341\"" Apr 12 18:50:04.599610 env[1151]: time="2024-04-12T18:50:04.599531310Z" level=info msg="CreateContainer within sandbox \"243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:50:04.616796 env[1151]: time="2024-04-12T18:50:04.616724419Z" level=info msg="CreateContainer within sandbox \"243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"66d31355d4417d2be48ca439df37db6f6715e2545cc147f25ae375345058aadd\"" Apr 12 18:50:04.617444 env[1151]: time="2024-04-12T18:50:04.617388302Z" level=info msg="StartContainer for \"66d31355d4417d2be48ca439df37db6f6715e2545cc147f25ae375345058aadd\"" Apr 12 18:50:04.645742 systemd[1]: Started cri-containerd-66d31355d4417d2be48ca439df37db6f6715e2545cc147f25ae375345058aadd.scope. Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.666000 audit: BPF prog-id=171 op=LOAD Apr 12 18:50:04.666000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.666000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3661 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643331333535643434313764326265343863613433396466333764 Apr 12 18:50:04.666000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.666000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3661 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643331333535643434313764326265343863613433396466333764 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit: BPF prog-id=172 op=LOAD Apr 12 18:50:04.667000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a03a0 items=0 ppid=3661 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643331333535643434313764326265343863613433396466333764 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit: BPF prog-id=173 op=LOAD Apr 12 18:50:04.667000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a03e8 items=0 ppid=3661 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643331333535643434313764326265343863613433396466333764 Apr 12 18:50:04.667000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:50:04.667000 audit: BPF prog-id=172 op=UNLOAD Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:04.667000 audit: BPF prog-id=174 op=LOAD Apr 12 18:50:04.667000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a07f8 items=0 ppid=3661 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:04.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636643331333535643434313764326265343863613433396466333764 Apr 12 18:50:04.691765 env[1151]: time="2024-04-12T18:50:04.691446948Z" level=info msg="StartContainer for \"66d31355d4417d2be48ca439df37db6f6715e2545cc147f25ae375345058aadd\" returns successfully" Apr 12 18:50:05.213227 env[1151]: time="2024-04-12T18:50:05.213160979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:05.216080 env[1151]: time="2024-04-12T18:50:05.216028481Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:05.221536 env[1151]: time="2024-04-12T18:50:05.221485851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:05.224541 env[1151]: time="2024-04-12T18:50:05.224463162Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:05.225379 env[1151]: time="2024-04-12T18:50:05.225327276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:50:05.231343 env[1151]: time="2024-04-12T18:50:05.231262112Z" level=info msg="CreateContainer within sandbox \"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:50:05.254139 env[1151]: time="2024-04-12T18:50:05.254013731Z" level=info msg="CreateContainer within sandbox \"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"448e3dc2e10b770fe0deef03b9e0a76d2476a670f049293531becfe9de7a662d\"" Apr 12 18:50:05.256391 env[1151]: time="2024-04-12T18:50:05.256303756Z" level=info msg="StartContainer for \"448e3dc2e10b770fe0deef03b9e0a76d2476a670f049293531becfe9de7a662d\"" Apr 12 18:50:05.318989 kubelet[2096]: I0412 18:50:05.316583 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-2rr9w" podStartSLOduration=34.316513466 podCreationTimestamp="2024-04-12 18:49:31 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:50:05.289425107 +0000 UTC m=+48.513116824" watchObservedRunningTime="2024-04-12 18:50:05.316513466 +0000 UTC m=+48.540205188" Apr 12 18:50:05.319711 systemd-networkd[1034]: cali54b83e81520: Gained IPv6LL Apr 12 18:50:05.330441 systemd[1]: Started cri-containerd-448e3dc2e10b770fe0deef03b9e0a76d2476a670f049293531becfe9de7a662d.scope. Apr 12 18:50:05.371000 audit[3764]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:05.371000 audit[3764]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc658aca10 a2=0 a3=7ffc658ac9fc items=0 ppid=2235 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:05.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f78f50953f8 items=0 ppid=3457 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:05.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386533646332653130623737306665306465656630336239653061 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.373000 audit: BPF prog-id=175 op=LOAD Apr 12 18:50:05.373000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000263c78 items=0 ppid=3457 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:05.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386533646332653130623737306665306465656630336239653061 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.374000 audit: BPF prog-id=176 op=LOAD Apr 12 18:50:05.373000 audit[3764]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=3764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:05.373000 audit[3764]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc658aca10 a2=0 a3=7ffc658ac9fc items=0 ppid=2235 pid=3764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:05.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:05.374000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000263cc8 items=0 ppid=3457 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:05.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386533646332653130623737306665306465656630336239653061 Apr 12 18:50:05.376000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:50:05.376000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { perfmon } for pid=3745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit[3745]: AVC avc: denied { bpf } for pid=3745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:05.376000 audit: BPF prog-id=177 op=LOAD Apr 12 18:50:05.376000 audit[3745]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000263d58 items=0 ppid=3457 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:05.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434386533646332653130623737306665306465656630336239653061 Apr 12 18:50:05.403315 env[1151]: time="2024-04-12T18:50:05.403248290Z" level=info msg="StartContainer for \"448e3dc2e10b770fe0deef03b9e0a76d2476a670f049293531becfe9de7a662d\" returns successfully" Apr 12 18:50:05.407722 env[1151]: time="2024-04-12T18:50:05.407672837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:50:06.018633 env[1151]: time="2024-04-12T18:50:06.018567323Z" level=info msg="StopPodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\"" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.081 [INFO][3790] k8s.go 585: Cleaning up netns ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.081 [INFO][3790] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" iface="eth0" netns="/var/run/netns/cni-50fc35f1-2766-9399-5508-7099128f94c5" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.081 [INFO][3790] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" iface="eth0" netns="/var/run/netns/cni-50fc35f1-2766-9399-5508-7099128f94c5" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.081 [INFO][3790] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" iface="eth0" netns="/var/run/netns/cni-50fc35f1-2766-9399-5508-7099128f94c5" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.082 [INFO][3790] k8s.go 592: Releasing IP address(es) ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.082 [INFO][3790] utils.go 188: Calico CNI releasing IP address ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.113 [INFO][3796] ipam_plugin.go 415: Releasing address using handleID ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.113 [INFO][3796] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.113 [INFO][3796] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.126 [WARNING][3796] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.126 [INFO][3796] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.128 [INFO][3796] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:06.131623 env[1151]: 2024-04-12 18:50:06.130 [INFO][3790] k8s.go 598: Teardown processing complete. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:06.132429 env[1151]: time="2024-04-12T18:50:06.131841928Z" level=info msg="TearDown network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" successfully" Apr 12 18:50:06.132429 env[1151]: time="2024-04-12T18:50:06.131894185Z" level=info msg="StopPodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" returns successfully" Apr 12 18:50:06.133451 env[1151]: time="2024-04-12T18:50:06.133409807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbf47c6c7-hshf6,Uid:280c510f-472a-4d01-ae7f-f3ff53c90be7,Namespace:calico-system,Attempt:1,}" Apr 12 18:50:06.182181 systemd[1]: run-containerd-runc-k8s.io-448e3dc2e10b770fe0deef03b9e0a76d2476a670f049293531becfe9de7a662d-runc.ddHd8t.mount: Deactivated successfully. Apr 12 18:50:06.182390 systemd[1]: run-netns-cni\x2d50fc35f1\x2d2766\x2d9399\x2d5508\x2d7099128f94c5.mount: Deactivated successfully. Apr 12 18:50:06.279312 systemd-networkd[1034]: cali69cd270ce9a: Gained IPv6LL Apr 12 18:50:06.361648 systemd-networkd[1034]: calid6270933f1d: Link UP Apr 12 18:50:06.367321 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:50:06.378150 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid6270933f1d: link becomes ready Apr 12 18:50:06.381304 systemd-networkd[1034]: calid6270933f1d: Gained carrier Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.213 [INFO][3802] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0 calico-kube-controllers-dbf47c6c7- calico-system 280c510f-472a-4d01-ae7f-f3ff53c90be7 747 0 2024-04-12 18:49:36 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:dbf47c6c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal calico-kube-controllers-dbf47c6c7-hshf6 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid6270933f1d [] []}} ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.213 [INFO][3802] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.262 [INFO][3814] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" HandleID="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.293 [INFO][3814] ipam_plugin.go 268: Auto assigning IP ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" HandleID="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000cfd00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", "pod":"calico-kube-controllers-dbf47c6c7-hshf6", "timestamp":"2024-04-12 18:50:06.262360223 +0000 UTC"}, Hostname:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.294 [INFO][3814] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.294 [INFO][3814] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.294 [INFO][3814] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.298 [INFO][3814] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.309 [INFO][3814] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.316 [INFO][3814] ipam.go 489: Trying affinity for 192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.320 [INFO][3814] ipam.go 155: Attempting to load block cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.325 [INFO][3814] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.325 [INFO][3814] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.0/26 handle="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.330 [INFO][3814] ipam.go 1682: Creating new handle: k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.337 [INFO][3814] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.0/26 handle="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.353 [INFO][3814] ipam.go 1216: Successfully claimed IPs: [192.168.98.4/26] block=192.168.98.0/26 handle="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.353 [INFO][3814] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.4/26] handle="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.353 [INFO][3814] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:06.396132 env[1151]: 2024-04-12 18:50:06.353 [INFO][3814] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.4/26] IPv6=[] ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" HandleID="k8s-pod-network.65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.397853 env[1151]: 2024-04-12 18:50:06.355 [INFO][3802] k8s.go 385: Populated endpoint ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0", GenerateName:"calico-kube-controllers-dbf47c6c7-", Namespace:"calico-system", SelfLink:"", UID:"280c510f-472a-4d01-ae7f-f3ff53c90be7", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbf47c6c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-dbf47c6c7-hshf6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid6270933f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:06.397853 env[1151]: 2024-04-12 18:50:06.355 [INFO][3802] k8s.go 386: Calico CNI using IPs: [192.168.98.4/32] ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.397853 env[1151]: 2024-04-12 18:50:06.355 [INFO][3802] dataplane_linux.go 68: Setting the host side veth name to calid6270933f1d ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.397853 env[1151]: 2024-04-12 18:50:06.380 [INFO][3802] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.397853 env[1151]: 2024-04-12 18:50:06.382 [INFO][3802] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0", GenerateName:"calico-kube-controllers-dbf47c6c7-", Namespace:"calico-system", SelfLink:"", UID:"280c510f-472a-4d01-ae7f-f3ff53c90be7", ResourceVersion:"747", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbf47c6c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e", Pod:"calico-kube-controllers-dbf47c6c7-hshf6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid6270933f1d", MAC:"fa:0c:75:52:3e:3d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:06.397853 env[1151]: 2024-04-12 18:50:06.392 [INFO][3802] k8s.go 498: Wrote updated endpoint to datastore ContainerID="65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e" Namespace="calico-system" Pod="calico-kube-controllers-dbf47c6c7-hshf6" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:06.407000 audit[3827]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:06.407000 audit[3827]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffceaf7ff00 a2=0 a3=7ffceaf7feec items=0 ppid=2235 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:06.419000 audit[3827]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3827 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:06.419000 audit[3827]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffceaf7ff00 a2=0 a3=7ffceaf7feec items=0 ppid=2235 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:06.488388 env[1151]: time="2024-04-12T18:50:06.479002017Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:50:06.488388 env[1151]: time="2024-04-12T18:50:06.479049842Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:50:06.488388 env[1151]: time="2024-04-12T18:50:06.479068889Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:50:06.488388 env[1151]: time="2024-04-12T18:50:06.479263285Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e pid=3845 runtime=io.containerd.runc.v2 Apr 12 18:50:06.511000 audit[3846]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3846 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:06.511000 audit[3846]: SYSCALL arch=c000003e syscall=46 success=yes exit=21016 a0=3 a1=7fff63d02900 a2=0 a3=7fff63d028ec items=0 ppid=3174 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.511000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:06.548293 systemd[1]: run-containerd-runc-k8s.io-65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e-runc.JtFBJh.mount: Deactivated successfully. Apr 12 18:50:06.553811 systemd[1]: Started cri-containerd-65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e.scope. Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.577000 audit: BPF prog-id=178 op=LOAD Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3845 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616363613264646631326131313466373436613132303934643762 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3845 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616363613264646631326131313466373436613132303934643762 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit: BPF prog-id=179 op=LOAD Apr 12 18:50:06.578000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c20a0 items=0 ppid=3845 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616363613264646631326131313466373436613132303934643762 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit: BPF prog-id=180 op=LOAD Apr 12 18:50:06.578000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c20e8 items=0 ppid=3845 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616363613264646631326131313466373436613132303934643762 Apr 12 18:50:06.578000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:50:06.578000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { perfmon } for pid=3857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit[3857]: AVC avc: denied { bpf } for pid=3857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:06.578000 audit: BPF prog-id=181 op=LOAD Apr 12 18:50:06.578000 audit[3857]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c24f8 items=0 ppid=3845 pid=3857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:06.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635616363613264646631326131313466373436613132303934643762 Apr 12 18:50:06.626692 env[1151]: time="2024-04-12T18:50:06.626636112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-dbf47c6c7-hshf6,Uid:280c510f-472a-4d01-ae7f-f3ff53c90be7,Namespace:calico-system,Attempt:1,} returns sandbox id \"65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e\"" Apr 12 18:50:06.885537 env[1151]: time="2024-04-12T18:50:06.885385527Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:06.890261 env[1151]: time="2024-04-12T18:50:06.890203578Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:06.892581 env[1151]: time="2024-04-12T18:50:06.892519108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:06.894866 env[1151]: time="2024-04-12T18:50:06.894827582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:06.896139 env[1151]: time="2024-04-12T18:50:06.896065377Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:50:06.897134 env[1151]: time="2024-04-12T18:50:06.897043735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:50:06.900565 env[1151]: time="2024-04-12T18:50:06.900527836Z" level=info msg="CreateContainer within sandbox \"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:50:06.930466 env[1151]: time="2024-04-12T18:50:06.930390039Z" level=info msg="CreateContainer within sandbox \"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"4a41f52375a9e8e6948091be7e4a8e287c3d61882a9e6632310ba483a6d6c940\"" Apr 12 18:50:06.931142 env[1151]: time="2024-04-12T18:50:06.931106209Z" level=info msg="StartContainer for \"4a41f52375a9e8e6948091be7e4a8e287c3d61882a9e6632310ba483a6d6c940\"" Apr 12 18:50:06.962071 systemd[1]: Started cri-containerd-4a41f52375a9e8e6948091be7e4a8e287c3d61882a9e6632310ba483a6d6c940.scope. Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb81d411bd8 items=0 ppid=3457 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:07.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343166353233373561396538653639343830393162653765346138 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.000000 audit: BPF prog-id=182 op=LOAD Apr 12 18:50:07.000000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009a208 items=0 ppid=3457 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:07.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343166353233373561396538653639343830393162653765346138 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit: BPF prog-id=183 op=LOAD Apr 12 18:50:07.001000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009a258 items=0 ppid=3457 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:07.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343166353233373561396538653639343830393162653765346138 Apr 12 18:50:07.001000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:50:07.001000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { perfmon } for pid=3888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit[3888]: AVC avc: denied { bpf } for pid=3888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:07.001000 audit: BPF prog-id=184 op=LOAD Apr 12 18:50:07.001000 audit[3888]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009a2e8 items=0 ppid=3457 pid=3888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:07.001000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461343166353233373561396538653639343830393162653765346138 Apr 12 18:50:07.032499 env[1151]: time="2024-04-12T18:50:07.032436074Z" level=info msg="StartContainer for \"4a41f52375a9e8e6948091be7e4a8e287c3d61882a9e6632310ba483a6d6c940\" returns successfully" Apr 12 18:50:07.189003 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3782135696.mount: Deactivated successfully. Apr 12 18:50:07.194886 kubelet[2096]: I0412 18:50:07.194454 2096 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:50:07.194886 kubelet[2096]: I0412 18:50:07.194498 2096 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:50:07.327642 kubelet[2096]: I0412 18:50:07.326694 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-fskrn" podStartSLOduration=28.145056495 podCreationTimestamp="2024-04-12 18:49:36 +0000 UTC" firstStartedPulling="2024-04-12 18:50:03.715243542 +0000 UTC m=+46.938935253" lastFinishedPulling="2024-04-12 18:50:06.896798025 +0000 UTC m=+50.120489740" observedRunningTime="2024-04-12 18:50:07.325813042 +0000 UTC m=+50.549504768" watchObservedRunningTime="2024-04-12 18:50:07.326610982 +0000 UTC m=+50.550302715" Apr 12 18:50:08.007897 systemd-networkd[1034]: calid6270933f1d: Gained IPv6LL Apr 12 18:50:09.926121 env[1151]: time="2024-04-12T18:50:09.926032063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:09.929923 env[1151]: time="2024-04-12T18:50:09.928971951Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:09.937109 env[1151]: time="2024-04-12T18:50:09.937017641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:09.950804 env[1151]: time="2024-04-12T18:50:09.946894716Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:50:09.950804 env[1151]: time="2024-04-12T18:50:09.947713757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:09.980515 env[1151]: time="2024-04-12T18:50:09.980463493Z" level=info msg="CreateContainer within sandbox \"65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:50:10.008430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount318518579.mount: Deactivated successfully. Apr 12 18:50:10.014627 env[1151]: time="2024-04-12T18:50:10.014566533Z" level=info msg="CreateContainer within sandbox \"65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe\"" Apr 12 18:50:10.015880 env[1151]: time="2024-04-12T18:50:10.015843367Z" level=info msg="StartContainer for \"49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe\"" Apr 12 18:50:10.058054 systemd[1]: Started cri-containerd-49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe.scope. Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.141179 kernel: kauditd_printk_skb: 456 callbacks suppressed Apr 12 18:50:10.141322 kernel: audit: type=1400 audit(1712947810.133:1217): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.184326 kernel: audit: type=1400 audit(1712947810.133:1218): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.212181 kernel: audit: type=1400 audit(1712947810.133:1219): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.234122 kernel: audit: type=1400 audit(1712947810.133:1220): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.256685 kernel: audit: type=1400 audit(1712947810.133:1221): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.278134 kernel: audit: type=1400 audit(1712947810.133:1222): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.297792 env[1151]: time="2024-04-12T18:50:10.297724061Z" level=info msg="StartContainer for \"49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe\" returns successfully" Apr 12 18:50:10.303114 kernel: audit: type=1400 audit(1712947810.133:1223): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.326249 kernel: audit: type=1400 audit(1712947810.133:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.351634 kernel: audit: type=1400 audit(1712947810.133:1225): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.351795 kernel: audit: type=1400 audit(1712947810.134:1226): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.134000 audit: BPF prog-id=185 op=LOAD Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3845 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:10.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623839303565383466666239666433653266353738306436636366 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3845 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:10.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623839303565383466666239666433653266353738306436636366 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.156000 audit: BPF prog-id=186 op=LOAD Apr 12 18:50:10.156000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000219bd0 items=0 ppid=3845 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:10.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623839303565383466666239666433653266353738306436636366 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit: BPF prog-id=187 op=LOAD Apr 12 18:50:10.160000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000219c18 items=0 ppid=3845 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:10.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623839303565383466666239666433653266353738306436636366 Apr 12 18:50:10.160000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:50:10.160000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { perfmon } for pid=3929 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit[3929]: AVC avc: denied { bpf } for pid=3929 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:10.160000 audit: BPF prog-id=188 op=LOAD Apr 12 18:50:10.160000 audit[3929]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000388028 items=0 ppid=3845 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:10.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439623839303565383466666239666433653266353738306436636366 Apr 12 18:50:11.367352 systemd[1]: run-containerd-runc-k8s.io-49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe-runc.JFj4u1.mount: Deactivated successfully. Apr 12 18:50:11.442479 kubelet[2096]: I0412 18:50:11.442408 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-dbf47c6c7-hshf6" podStartSLOduration=32.119844183 podCreationTimestamp="2024-04-12 18:49:36 +0000 UTC" firstStartedPulling="2024-04-12 18:50:06.628745959 +0000 UTC m=+49.852437672" lastFinishedPulling="2024-04-12 18:50:09.951227512 +0000 UTC m=+53.174919225" observedRunningTime="2024-04-12 18:50:10.353763226 +0000 UTC m=+53.577454950" watchObservedRunningTime="2024-04-12 18:50:11.442325736 +0000 UTC m=+54.666017461" Apr 12 18:50:12.807791 systemd[1]: run-containerd-runc-k8s.io-7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab-runc.e4U8t1.mount: Deactivated successfully. Apr 12 18:50:12.856000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=526945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:12.856000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0081879b0 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:50:12.856000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:50:12.856000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:12.856000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0081879e0 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:50:12.856000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:50:12.857000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:12.857000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00474a1c0 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:50:12.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:50:12.888000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=526951 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:12.888000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00729a750 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:50:12.888000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:50:12.894000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:12.894000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00a21ff00 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:50:12.894000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:50:12.895000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:12.895000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008318210 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:50:12.895000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:50:13.738000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:13.738000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:13.738000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f2cca0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:50:13.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:50:13.738000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00179cab0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:50:13.738000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:50:16.532152 kubelet[2096]: I0412 18:50:16.532068 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:50:16.542029 kubelet[2096]: W0412 18:50:16.541982 2096 reflector.go:533] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:50:16.542248 kubelet[2096]: E0412 18:50:16.542037 2096 reflector.go:148] object-"calico-apiserver"/"calico-apiserver-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:50:16.542248 kubelet[2096]: W0412 18:50:16.542060 2096 reflector.go:533] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:50:16.542248 kubelet[2096]: E0412 18:50:16.542073 2096 reflector.go:148] object-"calico-apiserver"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' and this object Apr 12 18:50:16.542504 systemd[1]: Created slice kubepods-besteffort-pod480501ed_c899_4a83_aef1_5327bf0cc8fe.slice. Apr 12 18:50:16.577798 kubelet[2096]: I0412 18:50:16.577735 2096 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:50:16.586853 systemd[1]: Created slice kubepods-besteffort-pod2c4d0b06_9d5a_4e7e_948a_c8db63beed8a.slice. Apr 12 18:50:16.642875 kubelet[2096]: I0412 18:50:16.642831 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jjmv6\" (UniqueName: \"kubernetes.io/projected/2c4d0b06-9d5a-4e7e-948a-c8db63beed8a-kube-api-access-jjmv6\") pod \"calico-apiserver-69679f8d98-wx92g\" (UID: \"2c4d0b06-9d5a-4e7e-948a-c8db63beed8a\") " pod="calico-apiserver/calico-apiserver-69679f8d98-wx92g" Apr 12 18:50:16.643245 kubelet[2096]: I0412 18:50:16.643220 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/480501ed-c899-4a83-aef1-5327bf0cc8fe-calico-apiserver-certs\") pod \"calico-apiserver-69679f8d98-92x7h\" (UID: \"480501ed-c899-4a83-aef1-5327bf0cc8fe\") " pod="calico-apiserver/calico-apiserver-69679f8d98-92x7h" Apr 12 18:50:16.643445 kubelet[2096]: I0412 18:50:16.643429 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9xv4v\" (UniqueName: \"kubernetes.io/projected/480501ed-c899-4a83-aef1-5327bf0cc8fe-kube-api-access-9xv4v\") pod \"calico-apiserver-69679f8d98-92x7h\" (UID: \"480501ed-c899-4a83-aef1-5327bf0cc8fe\") " pod="calico-apiserver/calico-apiserver-69679f8d98-92x7h" Apr 12 18:50:16.643671 kubelet[2096]: I0412 18:50:16.643657 2096 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2c4d0b06-9d5a-4e7e-948a-c8db63beed8a-calico-apiserver-certs\") pod \"calico-apiserver-69679f8d98-wx92g\" (UID: \"2c4d0b06-9d5a-4e7e-948a-c8db63beed8a\") " pod="calico-apiserver/calico-apiserver-69679f8d98-wx92g" Apr 12 18:50:16.720934 kernel: kauditd_printk_skb: 71 callbacks suppressed Apr 12 18:50:16.721067 kernel: audit: type=1325 audit(1712947816.697:1243): table=filter:113 family=2 entries=8 op=nft_register_rule pid=4033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.697000 audit[4033]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=4033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.697000 audit[4033]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffebb1c90e0 a2=0 a3=7ffebb1c90cc items=0 ppid=2235 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.738241 systemd[1]: Started sshd@7-10.128.0.18:22-139.178.89.65:51992.service. Apr 12 18:50:16.765168 kernel: audit: type=1300 audit(1712947816.697:1243): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffebb1c90e0 a2=0 a3=7ffebb1c90cc items=0 ppid=2235 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.788587 kernel: audit: type=1327 audit(1712947816.697:1243): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.18:22-139.178.89.65:51992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:16.814817 kernel: audit: type=1130 audit(1712947816.737:1244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.18:22-139.178.89.65:51992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:16.795000 audit[4033]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.840116 kernel: audit: type=1325 audit(1712947816.795:1245): table=nat:114 family=2 entries=20 op=nft_register_rule pid=4033 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.795000 audit[4033]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffebb1c90e0 a2=0 a3=7ffebb1c90cc items=0 ppid=2235 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.877269 kernel: audit: type=1300 audit(1712947816.795:1245): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffebb1c90e0 a2=0 a3=7ffebb1c90cc items=0 ppid=2235 pid=4033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.847000 audit[4039]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.915503 kernel: audit: type=1327 audit(1712947816.795:1245): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.915645 kernel: audit: type=1325 audit(1712947816.847:1246): table=filter:115 family=2 entries=9 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.948943 kernel: audit: type=1300 audit(1712947816.847:1246): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc9115bb00 a2=0 a3=7ffc9115baec items=0 ppid=2235 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.847000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc9115bb00 a2=0 a3=7ffc9115baec items=0 ppid=2235 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.847000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.978021 kernel: audit: type=1327 audit(1712947816.847:1246): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.853000 audit[4039]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4039 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:16.853000 audit[4039]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc9115bb00 a2=0 a3=7ffc9115baec items=0 ppid=2235 pid=4039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:16.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:16.993470 env[1151]: time="2024-04-12T18:50:16.993360646Z" level=info msg="StopPodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\"" Apr 12 18:50:17.152000 audit[4035]: USER_ACCT pid=4035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:17.154000 audit[4035]: CRED_ACQ pid=4035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:17.154000 audit[4035]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef8d3b870 a2=3 a3=0 items=0 ppid=1 pid=4035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:17.154000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:17.157658 sshd[4035]: Accepted publickey for core from 139.178.89.65 port 51992 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:17.156222 sshd[4035]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:17.172956 systemd[1]: Started session-8.scope. Apr 12 18:50:17.175160 systemd-logind[1136]: New session 8 of user core. Apr 12 18:50:17.189000 audit[4035]: USER_START pid=4035 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:17.195000 audit[4066]: CRED_ACQ pid=4066 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.109 [WARNING][4052] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4ac34cc8-3435-448d-b1fb-84732b25d8cb", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852", Pod:"csi-node-driver-fskrn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2403f0c0af4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.109 [INFO][4052] k8s.go 585: Cleaning up netns ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.109 [INFO][4052] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" iface="eth0" netns="" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.110 [INFO][4052] k8s.go 592: Releasing IP address(es) ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.110 [INFO][4052] utils.go 188: Calico CNI releasing IP address ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.184 [INFO][4060] ipam_plugin.go 415: Releasing address using handleID ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.184 [INFO][4060] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.185 [INFO][4060] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.213 [WARNING][4060] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.213 [INFO][4060] ipam_plugin.go 443: Releasing address using workloadID ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.221 [INFO][4060] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:17.228154 env[1151]: 2024-04-12 18:50:17.225 [INFO][4052] k8s.go 598: Teardown processing complete. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.229002 env[1151]: time="2024-04-12T18:50:17.228206000Z" level=info msg="TearDown network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" successfully" Apr 12 18:50:17.229002 env[1151]: time="2024-04-12T18:50:17.228250114Z" level=info msg="StopPodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" returns successfully" Apr 12 18:50:17.229133 env[1151]: time="2024-04-12T18:50:17.229064159Z" level=info msg="RemovePodSandbox for \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\"" Apr 12 18:50:17.229203 env[1151]: time="2024-04-12T18:50:17.229135125Z" level=info msg="Forcibly stopping sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\"" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.309 [WARNING][4079] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4ac34cc8-3435-448d-b1fb-84732b25d8cb", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"c02492e3ee306ae0674a48aca8a3e05557b6ca333a3ecc093122efee7beef852", Pod:"csi-node-driver-fskrn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali2403f0c0af4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.309 [INFO][4079] k8s.go 585: Cleaning up netns ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.309 [INFO][4079] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" iface="eth0" netns="" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.309 [INFO][4079] k8s.go 592: Releasing IP address(es) ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.309 [INFO][4079] utils.go 188: Calico CNI releasing IP address ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.361 [INFO][4085] ipam_plugin.go 415: Releasing address using handleID ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.362 [INFO][4085] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.362 [INFO][4085] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.379 [WARNING][4085] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.380 [INFO][4085] ipam_plugin.go 443: Releasing address using workloadID ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" HandleID="k8s-pod-network.be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-csi--node--driver--fskrn-eth0" Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.385 [INFO][4085] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:17.388529 env[1151]: 2024-04-12 18:50:17.386 [INFO][4079] k8s.go 598: Teardown processing complete. ContainerID="be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f" Apr 12 18:50:17.390797 env[1151]: time="2024-04-12T18:50:17.390736734Z" level=info msg="TearDown network for sandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" successfully" Apr 12 18:50:17.430231 env[1151]: time="2024-04-12T18:50:17.429344938Z" level=info msg="RemovePodSandbox \"be9e4d3599ec6c85b9f5b915844b2913f555e6b6c211ad9d3d9473be9a00cf0f\" returns successfully" Apr 12 18:50:17.430231 env[1151]: time="2024-04-12T18:50:17.430182080Z" level=info msg="StopPodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\"" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.512 [WARNING][4111] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0", GenerateName:"calico-kube-controllers-dbf47c6c7-", Namespace:"calico-system", SelfLink:"", UID:"280c510f-472a-4d01-ae7f-f3ff53c90be7", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbf47c6c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e", Pod:"calico-kube-controllers-dbf47c6c7-hshf6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid6270933f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.513 [INFO][4111] k8s.go 585: Cleaning up netns ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.514 [INFO][4111] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" iface="eth0" netns="" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.514 [INFO][4111] k8s.go 592: Releasing IP address(es) ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.514 [INFO][4111] utils.go 188: Calico CNI releasing IP address ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.562 [INFO][4117] ipam_plugin.go 415: Releasing address using handleID ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.562 [INFO][4117] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.562 [INFO][4117] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.572 [WARNING][4117] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.572 [INFO][4117] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.574 [INFO][4117] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:17.578163 env[1151]: 2024-04-12 18:50:17.576 [INFO][4111] k8s.go 598: Teardown processing complete. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.579037 env[1151]: time="2024-04-12T18:50:17.578152287Z" level=info msg="TearDown network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" successfully" Apr 12 18:50:17.579037 env[1151]: time="2024-04-12T18:50:17.578203584Z" level=info msg="StopPodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" returns successfully" Apr 12 18:50:17.579037 env[1151]: time="2024-04-12T18:50:17.578796670Z" level=info msg="RemovePodSandbox for \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\"" Apr 12 18:50:17.579037 env[1151]: time="2024-04-12T18:50:17.578840843Z" level=info msg="Forcibly stopping sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\"" Apr 12 18:50:17.606420 sshd[4035]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:17.609000 audit[4035]: USER_END pid=4035 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:17.609000 audit[4035]: CRED_DISP pid=4035 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:17.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.18:22-139.178.89.65:51992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:17.613207 systemd[1]: sshd@7-10.128.0.18:22-139.178.89.65:51992.service: Deactivated successfully. Apr 12 18:50:17.614357 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:50:17.615297 systemd-logind[1136]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:50:17.618585 systemd-logind[1136]: Removed session 8. Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.645 [WARNING][4136] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0", GenerateName:"calico-kube-controllers-dbf47c6c7-", Namespace:"calico-system", SelfLink:"", UID:"280c510f-472a-4d01-ae7f-f3ff53c90be7", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"dbf47c6c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"65acca2ddf12a114f746a12094d7b955f45bc62147c4431ee57b228139f22d0e", Pod:"calico-kube-controllers-dbf47c6c7-hshf6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.98.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid6270933f1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.645 [INFO][4136] k8s.go 585: Cleaning up netns ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.645 [INFO][4136] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" iface="eth0" netns="" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.645 [INFO][4136] k8s.go 592: Releasing IP address(es) ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.645 [INFO][4136] utils.go 188: Calico CNI releasing IP address ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.676 [INFO][4143] ipam_plugin.go 415: Releasing address using handleID ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.676 [INFO][4143] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.676 [INFO][4143] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.686 [WARNING][4143] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.686 [INFO][4143] ipam_plugin.go 443: Releasing address using workloadID ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" HandleID="k8s-pod-network.0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--kube--controllers--dbf47c6c7--hshf6-eth0" Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.690 [INFO][4143] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:17.694402 env[1151]: 2024-04-12 18:50:17.691 [INFO][4136] k8s.go 598: Teardown processing complete. ContainerID="0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090" Apr 12 18:50:17.694402 env[1151]: time="2024-04-12T18:50:17.692759871Z" level=info msg="TearDown network for sandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" successfully" Apr 12 18:50:17.699168 env[1151]: time="2024-04-12T18:50:17.699075045Z" level=info msg="RemovePodSandbox \"0cb9f28b3301b0ec76ecbd1d77852e89475c77f5be86f3323f89351682876090\" returns successfully" Apr 12 18:50:17.700345 env[1151]: time="2024-04-12T18:50:17.700297405Z" level=info msg="StopPodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\"" Apr 12 18:50:17.765955 kubelet[2096]: E0412 18:50:17.765908 2096 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Apr 12 18:50:17.766584 kubelet[2096]: E0412 18:50:17.766033 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/480501ed-c899-4a83-aef1-5327bf0cc8fe-calico-apiserver-certs podName:480501ed-c899-4a83-aef1-5327bf0cc8fe nodeName:}" failed. No retries permitted until 2024-04-12 18:50:18.266006164 +0000 UTC m=+61.489697874 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/480501ed-c899-4a83-aef1-5327bf0cc8fe-calico-apiserver-certs") pod "calico-apiserver-69679f8d98-92x7h" (UID: "480501ed-c899-4a83-aef1-5327bf0cc8fe") : failed to sync secret cache: timed out waiting for the condition Apr 12 18:50:17.766584 kubelet[2096]: E0412 18:50:17.766395 2096 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: failed to sync secret cache: timed out waiting for the condition Apr 12 18:50:17.766584 kubelet[2096]: E0412 18:50:17.766460 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2c4d0b06-9d5a-4e7e-948a-c8db63beed8a-calico-apiserver-certs podName:2c4d0b06-9d5a-4e7e-948a-c8db63beed8a nodeName:}" failed. No retries permitted until 2024-04-12 18:50:18.266438394 +0000 UTC m=+61.490130108 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2c4d0b06-9d5a-4e7e-948a-c8db63beed8a-calico-apiserver-certs") pod "calico-apiserver-69679f8d98-wx92g" (UID: "2c4d0b06-9d5a-4e7e-948a-c8db63beed8a") : failed to sync secret cache: timed out waiting for the condition Apr 12 18:50:17.788531 kubelet[2096]: E0412 18:50:17.788482 2096 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:50:17.788531 kubelet[2096]: E0412 18:50:17.788531 2096 projected.go:198] Error preparing data for projected volume kube-api-access-jjmv6 for pod calico-apiserver/calico-apiserver-69679f8d98-wx92g: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:50:17.788818 kubelet[2096]: E0412 18:50:17.788606 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/2c4d0b06-9d5a-4e7e-948a-c8db63beed8a-kube-api-access-jjmv6 podName:2c4d0b06-9d5a-4e7e-948a-c8db63beed8a nodeName:}" failed. No retries permitted until 2024-04-12 18:50:18.288583954 +0000 UTC m=+61.512275657 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-jjmv6" (UniqueName: "kubernetes.io/projected/2c4d0b06-9d5a-4e7e-948a-c8db63beed8a-kube-api-access-jjmv6") pod "calico-apiserver-69679f8d98-wx92g" (UID: "2c4d0b06-9d5a-4e7e-948a-c8db63beed8a") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:50:17.800483 kubelet[2096]: E0412 18:50:17.800437 2096 projected.go:292] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:50:17.800483 kubelet[2096]: E0412 18:50:17.800485 2096 projected.go:198] Error preparing data for projected volume kube-api-access-9xv4v for pod calico-apiserver/calico-apiserver-69679f8d98-92x7h: failed to sync configmap cache: timed out waiting for the condition Apr 12 18:50:17.800705 kubelet[2096]: E0412 18:50:17.800557 2096 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/480501ed-c899-4a83-aef1-5327bf0cc8fe-kube-api-access-9xv4v podName:480501ed-c899-4a83-aef1-5327bf0cc8fe nodeName:}" failed. No retries permitted until 2024-04-12 18:50:18.300534635 +0000 UTC m=+61.524226338 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-9xv4v" (UniqueName: "kubernetes.io/projected/480501ed-c899-4a83-aef1-5327bf0cc8fe-kube-api-access-9xv4v") pod "calico-apiserver-69679f8d98-92x7h" (UID: "480501ed-c899-4a83-aef1-5327bf0cc8fe") : failed to sync configmap cache: timed out waiting for the condition Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.773 [WARNING][4163] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8baca578-0051-43e1-aef2-da7984cea493", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341", Pod:"coredns-5d78c9869d-2rr9w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69cd270ce9a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.773 [INFO][4163] k8s.go 585: Cleaning up netns ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.773 [INFO][4163] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" iface="eth0" netns="" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.773 [INFO][4163] k8s.go 592: Releasing IP address(es) ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.773 [INFO][4163] utils.go 188: Calico CNI releasing IP address ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.815 [INFO][4170] ipam_plugin.go 415: Releasing address using handleID ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.815 [INFO][4170] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.815 [INFO][4170] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.829 [WARNING][4170] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.829 [INFO][4170] ipam_plugin.go 443: Releasing address using workloadID ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.831 [INFO][4170] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:17.834079 env[1151]: 2024-04-12 18:50:17.832 [INFO][4163] k8s.go 598: Teardown processing complete. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.835042 env[1151]: time="2024-04-12T18:50:17.834138900Z" level=info msg="TearDown network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" successfully" Apr 12 18:50:17.835042 env[1151]: time="2024-04-12T18:50:17.834184233Z" level=info msg="StopPodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" returns successfully" Apr 12 18:50:17.835042 env[1151]: time="2024-04-12T18:50:17.834830817Z" level=info msg="RemovePodSandbox for \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\"" Apr 12 18:50:17.835042 env[1151]: time="2024-04-12T18:50:17.834871178Z" level=info msg="Forcibly stopping sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\"" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.884 [WARNING][4188] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"8baca578-0051-43e1-aef2-da7984cea493", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"243dadf1fb2e7c9fedc768afe302c844d82f853901e67bf90db45415b0f0c341", Pod:"coredns-5d78c9869d-2rr9w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali69cd270ce9a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.884 [INFO][4188] k8s.go 585: Cleaning up netns ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.885 [INFO][4188] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" iface="eth0" netns="" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.885 [INFO][4188] k8s.go 592: Releasing IP address(es) ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.885 [INFO][4188] utils.go 188: Calico CNI releasing IP address ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.919 [INFO][4194] ipam_plugin.go 415: Releasing address using handleID ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.919 [INFO][4194] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.919 [INFO][4194] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.927 [WARNING][4194] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.927 [INFO][4194] ipam_plugin.go 443: Releasing address using workloadID ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" HandleID="k8s-pod-network.407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--2rr9w-eth0" Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.929 [INFO][4194] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:17.932596 env[1151]: 2024-04-12 18:50:17.931 [INFO][4188] k8s.go 598: Teardown processing complete. ContainerID="407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91" Apr 12 18:50:17.933277 env[1151]: time="2024-04-12T18:50:17.933202672Z" level=info msg="TearDown network for sandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" successfully" Apr 12 18:50:17.937997 env[1151]: time="2024-04-12T18:50:17.937938533Z" level=info msg="RemovePodSandbox \"407b62f366333cf9816e224ec4ee98ea062c4d1021ccbbeb67458a950d1c2c91\" returns successfully" Apr 12 18:50:17.938678 env[1151]: time="2024-04-12T18:50:17.938641013Z" level=info msg="StopPodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\"" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.003 [WARNING][4214] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5", Pod:"coredns-5d78c9869d-rstg6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali54b83e81520", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.004 [INFO][4214] k8s.go 585: Cleaning up netns ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.004 [INFO][4214] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" iface="eth0" netns="" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.004 [INFO][4214] k8s.go 592: Releasing IP address(es) ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.004 [INFO][4214] utils.go 188: Calico CNI releasing IP address ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.039 [INFO][4220] ipam_plugin.go 415: Releasing address using handleID ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.039 [INFO][4220] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.039 [INFO][4220] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.051 [WARNING][4220] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.051 [INFO][4220] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.053 [INFO][4220] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:18.057257 env[1151]: 2024-04-12 18:50:18.055 [INFO][4214] k8s.go 598: Teardown processing complete. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.058728 env[1151]: time="2024-04-12T18:50:18.058668299Z" level=info msg="TearDown network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" successfully" Apr 12 18:50:18.058876 env[1151]: time="2024-04-12T18:50:18.058835109Z" level=info msg="StopPodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" returns successfully" Apr 12 18:50:18.059712 env[1151]: time="2024-04-12T18:50:18.059657327Z" level=info msg="RemovePodSandbox for \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\"" Apr 12 18:50:18.059846 env[1151]: time="2024-04-12T18:50:18.059704888Z" level=info msg="Forcibly stopping sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\"" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.111 [WARNING][4239] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"5bfd61b9-ab1f-4cc2-9921-0ab44331baa5", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 49, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"69f5fd54073352fac2ef2c5cc40d5dd8ef06aeff66fc3fe281ca0e6630fe0aa5", Pod:"coredns-5d78c9869d-rstg6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.98.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali54b83e81520", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.111 [INFO][4239] k8s.go 585: Cleaning up netns ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.111 [INFO][4239] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" iface="eth0" netns="" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.111 [INFO][4239] k8s.go 592: Releasing IP address(es) ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.111 [INFO][4239] utils.go 188: Calico CNI releasing IP address ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.138 [INFO][4246] ipam_plugin.go 415: Releasing address using handleID ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.139 [INFO][4246] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.139 [INFO][4246] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.146 [WARNING][4246] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.146 [INFO][4246] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" HandleID="k8s-pod-network.c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-coredns--5d78c9869d--rstg6-eth0" Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.148 [INFO][4246] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:18.152376 env[1151]: 2024-04-12 18:50:18.150 [INFO][4239] k8s.go 598: Teardown processing complete. ContainerID="c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7" Apr 12 18:50:18.153358 env[1151]: time="2024-04-12T18:50:18.152426903Z" level=info msg="TearDown network for sandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" successfully" Apr 12 18:50:18.158906 env[1151]: time="2024-04-12T18:50:18.158845270Z" level=info msg="RemovePodSandbox \"c2950321ea7f9836bc45422024e0b250ba864a48ce00d0107c7bbe84b218adf7\" returns successfully" Apr 12 18:50:18.392844 env[1151]: time="2024-04-12T18:50:18.392175686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-69679f8d98-wx92g,Uid:2c4d0b06-9d5a-4e7e-948a-c8db63beed8a,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:50:18.556658 systemd-networkd[1034]: cali2ff158e0edb: Link UP Apr 12 18:50:18.568237 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:50:18.568501 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2ff158e0edb: link becomes ready Apr 12 18:50:18.570987 systemd-networkd[1034]: cali2ff158e0edb: Gained carrier Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.466 [INFO][4255] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0 calico-apiserver-69679f8d98- calico-apiserver 2c4d0b06-9d5a-4e7e-948a-c8db63beed8a 859 0 2024-04-12 18:50:16 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:69679f8d98 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal calico-apiserver-69679f8d98-wx92g eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2ff158e0edb [] []}} ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.466 [INFO][4255] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.503 [INFO][4267] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" HandleID="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.515 [INFO][4267] ipam_plugin.go 268: Auto assigning IP ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" HandleID="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ac3d0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", "pod":"calico-apiserver-69679f8d98-wx92g", "timestamp":"2024-04-12 18:50:18.503740692 +0000 UTC"}, Hostname:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.515 [INFO][4267] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.515 [INFO][4267] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.515 [INFO][4267] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.517 [INFO][4267] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.522 [INFO][4267] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.527 [INFO][4267] ipam.go 489: Trying affinity for 192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.530 [INFO][4267] ipam.go 155: Attempting to load block cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.533 [INFO][4267] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.533 [INFO][4267] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.0/26 handle="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.535 [INFO][4267] ipam.go 1682: Creating new handle: k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1 Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.539 [INFO][4267] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.0/26 handle="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.549 [INFO][4267] ipam.go 1216: Successfully claimed IPs: [192.168.98.5/26] block=192.168.98.0/26 handle="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.549 [INFO][4267] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.5/26] handle="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.550 [INFO][4267] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:18.591107 env[1151]: 2024-04-12 18:50:18.550 [INFO][4267] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.5/26] IPv6=[] ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" HandleID="k8s-pod-network.f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.592308 env[1151]: 2024-04-12 18:50:18.551 [INFO][4255] k8s.go 385: Populated endpoint ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0", GenerateName:"calico-apiserver-69679f8d98-", Namespace:"calico-apiserver", SelfLink:"", UID:"2c4d0b06-9d5a-4e7e-948a-c8db63beed8a", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"69679f8d98", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-69679f8d98-wx92g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.98.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2ff158e0edb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:18.592308 env[1151]: 2024-04-12 18:50:18.551 [INFO][4255] k8s.go 386: Calico CNI using IPs: [192.168.98.5/32] ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.592308 env[1151]: 2024-04-12 18:50:18.552 [INFO][4255] dataplane_linux.go 68: Setting the host side veth name to cali2ff158e0edb ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.592308 env[1151]: 2024-04-12 18:50:18.569 [INFO][4255] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.592308 env[1151]: 2024-04-12 18:50:18.569 [INFO][4255] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0", GenerateName:"calico-apiserver-69679f8d98-", Namespace:"calico-apiserver", SelfLink:"", UID:"2c4d0b06-9d5a-4e7e-948a-c8db63beed8a", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"69679f8d98", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1", Pod:"calico-apiserver-69679f8d98-wx92g", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.98.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2ff158e0edb", MAC:"c6:6c:a6:ba:aa:8f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:18.592308 env[1151]: 2024-04-12 18:50:18.586 [INFO][4255] k8s.go 498: Wrote updated endpoint to datastore ContainerID="f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-wx92g" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--wx92g-eth0" Apr 12 18:50:18.634929 env[1151]: time="2024-04-12T18:50:18.634668717Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:50:18.634929 env[1151]: time="2024-04-12T18:50:18.634724003Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:50:18.634929 env[1151]: time="2024-04-12T18:50:18.634745425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:50:18.635588 env[1151]: time="2024-04-12T18:50:18.635511879Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1 pid=4297 runtime=io.containerd.runc.v2 Apr 12 18:50:18.636000 audit[4299]: NETFILTER_CFG table=filter:117 family=2 entries=65 op=nft_register_chain pid=4299 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:18.636000 audit[4299]: SYSCALL arch=c000003e syscall=46 success=yes exit=32992 a0=3 a1=7ffe14568e30 a2=0 a3=7ffe14568e1c items=0 ppid=3174 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.636000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:18.648161 env[1151]: time="2024-04-12T18:50:18.648010376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-69679f8d98-92x7h,Uid:480501ed-c899-4a83-aef1-5327bf0cc8fe,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:50:18.661884 systemd[1]: Started cri-containerd-f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1.scope. Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.686000 audit: BPF prog-id=189 op=LOAD Apr 12 18:50:18.688000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.688000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303739653332663636303562366233656238656335356335316633 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303739653332663636303562366233656238656335356335316633 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.689000 audit: BPF prog-id=190 op=LOAD Apr 12 18:50:18.689000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003072b0 items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303739653332663636303562366233656238656335356335316633 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.690000 audit: BPF prog-id=191 op=LOAD Apr 12 18:50:18.690000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003072f8 items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303739653332663636303562366233656238656335356335316633 Apr 12 18:50:18.692000 audit: BPF prog-id=191 op=UNLOAD Apr 12 18:50:18.692000 audit: BPF prog-id=190 op=UNLOAD Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { perfmon } for pid=4307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit[4307]: AVC avc: denied { bpf } for pid=4307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.692000 audit: BPF prog-id=192 op=LOAD Apr 12 18:50:18.692000 audit[4307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000307708 items=0 ppid=4297 pid=4307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635303739653332663636303562366233656238656335356335316633 Apr 12 18:50:18.758592 env[1151]: time="2024-04-12T18:50:18.758515676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-69679f8d98-wx92g,Uid:2c4d0b06-9d5a-4e7e-948a-c8db63beed8a,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1\"" Apr 12 18:50:18.768281 env[1151]: time="2024-04-12T18:50:18.768220724Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:50:18.854296 systemd-networkd[1034]: cali0c6d0e6c4a7: Link UP Apr 12 18:50:18.862149 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0c6d0e6c4a7: link becomes ready Apr 12 18:50:18.862411 systemd-networkd[1034]: cali0c6d0e6c4a7: Gained carrier Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.753 [INFO][4325] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0 calico-apiserver-69679f8d98- calico-apiserver 480501ed-c899-4a83-aef1-5327bf0cc8fe 849 0 2024-04-12 18:50:16 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:69679f8d98 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal calico-apiserver-69679f8d98-92x7h eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0c6d0e6c4a7 [] []}} ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.754 [INFO][4325] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.801 [INFO][4345] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" HandleID="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.813 [INFO][4345] ipam_plugin.go 268: Auto assigning IP ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" HandleID="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c3d10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", "pod":"calico-apiserver-69679f8d98-92x7h", "timestamp":"2024-04-12 18:50:18.801635734 +0000 UTC"}, Hostname:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.813 [INFO][4345] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.813 [INFO][4345] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.813 [INFO][4345] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal' Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.817 [INFO][4345] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.823 [INFO][4345] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.828 [INFO][4345] ipam.go 489: Trying affinity for 192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.830 [INFO][4345] ipam.go 155: Attempting to load block cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.833 [INFO][4345] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.0/26 host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.833 [INFO][4345] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.0/26 handle="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.835 [INFO][4345] ipam.go 1682: Creating new handle: k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8 Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.841 [INFO][4345] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.0/26 handle="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.848 [INFO][4345] ipam.go 1216: Successfully claimed IPs: [192.168.98.6/26] block=192.168.98.0/26 handle="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.848 [INFO][4345] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.6/26] handle="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" host="ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal" Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.848 [INFO][4345] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:50:18.886619 env[1151]: 2024-04-12 18:50:18.848 [INFO][4345] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.6/26] IPv6=[] ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" HandleID="k8s-pod-network.4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Workload="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.887835 env[1151]: 2024-04-12 18:50:18.850 [INFO][4325] k8s.go 385: Populated endpoint ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0", GenerateName:"calico-apiserver-69679f8d98-", Namespace:"calico-apiserver", SelfLink:"", UID:"480501ed-c899-4a83-aef1-5327bf0cc8fe", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"69679f8d98", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-69679f8d98-92x7h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.98.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c6d0e6c4a7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:18.887835 env[1151]: 2024-04-12 18:50:18.850 [INFO][4325] k8s.go 386: Calico CNI using IPs: [192.168.98.6/32] ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.887835 env[1151]: 2024-04-12 18:50:18.850 [INFO][4325] dataplane_linux.go 68: Setting the host side veth name to cali0c6d0e6c4a7 ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.887835 env[1151]: 2024-04-12 18:50:18.863 [INFO][4325] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.887835 env[1151]: 2024-04-12 18:50:18.863 [INFO][4325] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0", GenerateName:"calico-apiserver-69679f8d98-", Namespace:"calico-apiserver", SelfLink:"", UID:"480501ed-c899-4a83-aef1-5327bf0cc8fe", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 50, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"69679f8d98", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-8cb45d1398a996b3efbf.c.flatcar-212911.internal", ContainerID:"4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8", Pod:"calico-apiserver-69679f8d98-92x7h", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.98.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c6d0e6c4a7", MAC:"3e:d7:9c:bc:9d:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:50:18.887835 env[1151]: 2024-04-12 18:50:18.884 [INFO][4325] k8s.go 498: Wrote updated endpoint to datastore ContainerID="4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8" Namespace="calico-apiserver" Pod="calico-apiserver-69679f8d98-92x7h" WorkloadEndpoint="ci--3510--3--3--8cb45d1398a996b3efbf.c.flatcar--212911.internal-k8s-calico--apiserver--69679f8d98--92x7h-eth0" Apr 12 18:50:18.922073 env[1151]: time="2024-04-12T18:50:18.917193699Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:50:18.922437 env[1151]: time="2024-04-12T18:50:18.922360610Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:50:18.922652 env[1151]: time="2024-04-12T18:50:18.922601014Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:50:18.923039 env[1151]: time="2024-04-12T18:50:18.922998504Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8 pid=4369 runtime=io.containerd.runc.v2 Apr 12 18:50:18.945889 systemd[1]: Started cri-containerd-4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8.scope. Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.986000 audit: BPF prog-id=193 op=LOAD Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363731383962626334646266346261626335366539383733313839 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363731383962626334646266346261626335366539383733313839 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.988000 audit: BPF prog-id=194 op=LOAD Apr 12 18:50:18.988000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00035fce0 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363731383962626334646266346261626335366539383733313839 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit: BPF prog-id=195 op=LOAD Apr 12 18:50:18.989000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00035fd28 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363731383962626334646266346261626335366539383733313839 Apr 12 18:50:18.989000 audit: BPF prog-id=195 op=UNLOAD Apr 12 18:50:18.989000 audit: BPF prog-id=194 op=UNLOAD Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:18.989000 audit: BPF prog-id=196 op=LOAD Apr 12 18:50:18.989000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003e0138 items=0 ppid=4369 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:18.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432363731383962626334646266346261626335366539383733313839 Apr 12 18:50:19.048000 audit[4399]: NETFILTER_CFG table=filter:118 family=2 entries=46 op=nft_register_chain pid=4399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:50:19.048000 audit[4399]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffddad58d30 a2=0 a3=7ffddad58d1c items=0 ppid=3174 pid=4399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:19.048000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:50:19.077158 env[1151]: time="2024-04-12T18:50:19.077067265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-69679f8d98-92x7h,Uid:480501ed-c899-4a83-aef1-5327bf0cc8fe,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8\"" Apr 12 18:50:19.655449 systemd-networkd[1034]: cali2ff158e0edb: Gained IPv6LL Apr 12 18:50:19.710254 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2022454590.mount: Deactivated successfully. Apr 12 18:50:19.825234 systemd[1]: run-containerd-runc-k8s.io-49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe-runc.VptWXL.mount: Deactivated successfully. Apr 12 18:50:20.743332 systemd-networkd[1034]: cali0c6d0e6c4a7: Gained IPv6LL Apr 12 18:50:21.638522 env[1151]: time="2024-04-12T18:50:21.638452027Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:21.642119 env[1151]: time="2024-04-12T18:50:21.642028730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:21.644677 env[1151]: time="2024-04-12T18:50:21.644627484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:21.647050 env[1151]: time="2024-04-12T18:50:21.647006427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:21.647700 env[1151]: time="2024-04-12T18:50:21.647646644Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:50:21.652267 env[1151]: time="2024-04-12T18:50:21.649787526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:50:21.653474 env[1151]: time="2024-04-12T18:50:21.653415797Z" level=info msg="CreateContainer within sandbox \"f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:50:21.678964 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2075599735.mount: Deactivated successfully. Apr 12 18:50:21.683454 env[1151]: time="2024-04-12T18:50:21.683361401Z" level=info msg="CreateContainer within sandbox \"f5079e32f6605b6b3eb8ec55c51f37e6ff0994ab3bc08b5064f9e7b0e62e2af1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c2abc06127a542442ef84dbbec8b170f68d547f241c01164877ff5fc7d9c5aa0\"" Apr 12 18:50:21.684460 env[1151]: time="2024-04-12T18:50:21.684415955Z" level=info msg="StartContainer for \"c2abc06127a542442ef84dbbec8b170f68d547f241c01164877ff5fc7d9c5aa0\"" Apr 12 18:50:21.728135 systemd[1]: Started cri-containerd-c2abc06127a542442ef84dbbec8b170f68d547f241c01164877ff5fc7d9c5aa0.scope. Apr 12 18:50:21.807184 kernel: kauditd_printk_skb: 133 callbacks suppressed Apr 12 18:50:21.807379 kernel: audit: type=1400 audit(1712947821.779:1294): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.832133 kernel: audit: type=1400 audit(1712947821.779:1295): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.876209 kernel: audit: type=1400 audit(1712947821.807:1296): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.876381 kernel: audit: type=1400 audit(1712947821.807:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.897912 kernel: audit: type=1400 audit(1712947821.807:1298): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.940800 kernel: audit: type=1400 audit(1712947821.807:1299): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.940990 kernel: audit: type=1400 audit(1712947821.807:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.983361 kernel: audit: type=1400 audit(1712947821.807:1301): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.983482 kernel: audit: type=1400 audit(1712947821.807:1302): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.006117 kernel: audit: type=1400 audit(1712947821.808:1303): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.808000 audit: BPF prog-id=197 op=LOAD Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4297 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:21.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332616263303631323761353432343432656638346462626563386231 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4297 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:21.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332616263303631323761353432343432656638346462626563386231 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit: BPF prog-id=198 op=LOAD Apr 12 18:50:21.809000 audit[4445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bc420 items=0 ppid=4297 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:21.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332616263303631323761353432343432656638346462626563386231 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.809000 audit: BPF prog-id=199 op=LOAD Apr 12 18:50:21.809000 audit[4445]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bc468 items=0 ppid=4297 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:21.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332616263303631323761353432343432656638346462626563386231 Apr 12 18:50:21.810000 audit: BPF prog-id=199 op=UNLOAD Apr 12 18:50:21.810000 audit: BPF prog-id=198 op=UNLOAD Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { perfmon } for pid=4445 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit[4445]: AVC avc: denied { bpf } for pid=4445 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:21.810000 audit: BPF prog-id=200 op=LOAD Apr 12 18:50:21.810000 audit[4445]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bc878 items=0 ppid=4297 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:21.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332616263303631323761353432343432656638346462626563386231 Apr 12 18:50:22.024073 env[1151]: time="2024-04-12T18:50:22.024018977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:22.026766 env[1151]: time="2024-04-12T18:50:22.026724535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:22.028794 env[1151]: time="2024-04-12T18:50:22.028760068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:22.031761 env[1151]: time="2024-04-12T18:50:22.031726305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:50:22.032736 env[1151]: time="2024-04-12T18:50:22.032699318Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:50:22.036134 env[1151]: time="2024-04-12T18:50:22.036072663Z" level=info msg="CreateContainer within sandbox \"4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:50:22.058725 env[1151]: time="2024-04-12T18:50:22.058640003Z" level=info msg="CreateContainer within sandbox \"4267189bbc4dbf4babc56e98731892f95d2c7af9a14221b1b95b1b5b2ab83df8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5b36b897560568b16ed10f3e9bb975a5ebb39bd8784fd4e853d2d3653ae2d2a8\"" Apr 12 18:50:22.059963 env[1151]: time="2024-04-12T18:50:22.059925171Z" level=info msg="StartContainer for \"5b36b897560568b16ed10f3e9bb975a5ebb39bd8784fd4e853d2d3653ae2d2a8\"" Apr 12 18:50:22.097229 systemd[1]: Started cri-containerd-5b36b897560568b16ed10f3e9bb975a5ebb39bd8784fd4e853d2d3653ae2d2a8.scope. Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.146000 audit: BPF prog-id=201 op=LOAD Apr 12 18:50:22.147000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.147000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4369 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333662383937353630353638623136656431306633653962623937 Apr 12 18:50:22.148000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.148000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4369 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333662383937353630353638623136656431306633653962623937 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit: BPF prog-id=202 op=LOAD Apr 12 18:50:22.152000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000267d00 items=0 ppid=4369 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333662383937353630353638623136656431306633653962623937 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.152000 audit: BPF prog-id=203 op=LOAD Apr 12 18:50:22.152000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000267d48 items=0 ppid=4369 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333662383937353630353638623136656431306633653962623937 Apr 12 18:50:22.153000 audit: BPF prog-id=203 op=UNLOAD Apr 12 18:50:22.153000 audit: BPF prog-id=202 op=UNLOAD Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { perfmon } for pid=4471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit[4471]: AVC avc: denied { bpf } for pid=4471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:50:22.153000 audit: BPF prog-id=204 op=LOAD Apr 12 18:50:22.153000 audit[4471]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2158 items=0 ppid=4369 pid=4471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333662383937353630353638623136656431306633653962623937 Apr 12 18:50:22.202263 env[1151]: time="2024-04-12T18:50:22.202206154Z" level=info msg="StartContainer for \"c2abc06127a542442ef84dbbec8b170f68d547f241c01164877ff5fc7d9c5aa0\" returns successfully" Apr 12 18:50:22.271772 env[1151]: time="2024-04-12T18:50:22.271698663Z" level=info msg="StartContainer for \"5b36b897560568b16ed10f3e9bb975a5ebb39bd8784fd4e853d2d3653ae2d2a8\" returns successfully" Apr 12 18:50:22.380937 kubelet[2096]: I0412 18:50:22.380893 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-69679f8d98-92x7h" podStartSLOduration=3.4265780169999998 podCreationTimestamp="2024-04-12 18:50:16 +0000 UTC" firstStartedPulling="2024-04-12 18:50:19.079567336 +0000 UTC m=+62.303259053" lastFinishedPulling="2024-04-12 18:50:22.033832392 +0000 UTC m=+65.257524095" observedRunningTime="2024-04-12 18:50:22.378077128 +0000 UTC m=+65.601768856" watchObservedRunningTime="2024-04-12 18:50:22.380843059 +0000 UTC m=+65.604534783" Apr 12 18:50:22.399956 kubelet[2096]: I0412 18:50:22.399912 2096 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-69679f8d98-wx92g" podStartSLOduration=3.513061204 podCreationTimestamp="2024-04-12 18:50:16 +0000 UTC" firstStartedPulling="2024-04-12 18:50:18.761504077 +0000 UTC m=+61.985195797" lastFinishedPulling="2024-04-12 18:50:21.648303358 +0000 UTC m=+64.871995063" observedRunningTime="2024-04-12 18:50:22.399463253 +0000 UTC m=+65.623154976" watchObservedRunningTime="2024-04-12 18:50:22.39986047 +0000 UTC m=+65.623552213" Apr 12 18:50:22.439000 audit[4513]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:22.439000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcca989340 a2=0 a3=7ffcca98932c items=0 ppid=2235 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:22.446000 audit[4513]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4513 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:22.446000 audit[4513]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcca989340 a2=0 a3=7ffcca98932c items=0 ppid=2235 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:22.463000 audit[4515]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:22.463000 audit[4515]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdffa69f30 a2=0 a3=7ffdffa69f1c items=0 ppid=2235 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:22.464000 audit[4515]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4515 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:22.464000 audit[4515]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdffa69f30 a2=0 a3=7ffdffa69f1c items=0 ppid=2235 pid=4515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:22.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:22.672946 systemd[1]: Started sshd@8-10.128.0.18:22-139.178.89.65:58776.service. Apr 12 18:50:22.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.18:22-139.178.89.65:58776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:22.685137 systemd[1]: run-containerd-runc-k8s.io-c2abc06127a542442ef84dbbec8b170f68d547f241c01164877ff5fc7d9c5aa0-runc.zQbtXr.mount: Deactivated successfully. Apr 12 18:50:23.028000 audit[4517]: USER_ACCT pid=4517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:23.031002 sshd[4517]: Accepted publickey for core from 139.178.89.65 port 58776 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:23.030000 audit[4517]: CRED_ACQ pid=4517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:23.030000 audit[4517]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2acdf400 a2=3 a3=0 items=0 ppid=1 pid=4517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:23.030000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:23.032198 sshd[4517]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:23.043151 systemd-logind[1136]: New session 9 of user core. Apr 12 18:50:23.044632 systemd[1]: Started session-9.scope. Apr 12 18:50:23.053000 audit[4517]: USER_START pid=4517 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:23.056000 audit[4519]: CRED_ACQ pid=4519 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:23.448362 sshd[4517]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:23.449000 audit[4517]: USER_END pid=4517 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:23.450000 audit[4517]: CRED_DISP pid=4517 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:23.454014 systemd-logind[1136]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:50:23.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.18:22-139.178.89.65:58776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:23.456532 systemd[1]: sshd@8-10.128.0.18:22-139.178.89.65:58776.service: Deactivated successfully. Apr 12 18:50:23.457753 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:50:23.460026 systemd-logind[1136]: Removed session 9. Apr 12 18:50:23.849000 audit[4482]: AVC avc: denied { watch } for pid=4482 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_50_18.510620110/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c178 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c178 tclass=file permissive=0 Apr 12 18:50:23.849000 audit[4482]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d42900 a2=fc6 a3=0 items=0 ppid=4369 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c178 key=(null) Apr 12 18:50:23.849000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:50:24.074000 audit[4457]: AVC avc: denied { watch } for pid=4457 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_50_18.4019655148/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c636 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c636 tclass=file permissive=0 Apr 12 18:50:24.074000 audit[4457]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000ba80a0 a2=fc6 a3=0 items=0 ppid=4297 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c636 key=(null) Apr 12 18:50:24.074000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:50:26.389767 systemd[1]: run-containerd-runc-k8s.io-49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe-runc.TU3mUT.mount: Deactivated successfully. Apr 12 18:50:28.503224 systemd[1]: Started sshd@9-10.128.0.18:22-139.178.89.65:34934.service. Apr 12 18:50:28.534676 kernel: kauditd_printk_skb: 133 callbacks suppressed Apr 12 18:50:28.534833 kernel: audit: type=1130 audit(1712947828.502:1345): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.18:22-139.178.89.65:34934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:28.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.18:22-139.178.89.65:34934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:28.849000 audit[4554]: USER_ACCT pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:28.856791 sshd[4554]: Accepted publickey for core from 139.178.89.65 port 34934 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:28.881146 kernel: audit: type=1101 audit(1712947828.849:1346): pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:28.882556 sshd[4554]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:28.880000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:28.895070 systemd[1]: Started session-10.scope. Apr 12 18:50:28.898289 systemd-logind[1136]: New session 10 of user core. Apr 12 18:50:28.911887 kernel: audit: type=1103 audit(1712947828.880:1347): pid=4554 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:28.912023 kernel: audit: type=1006 audit(1712947828.880:1348): pid=4554 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:50:28.926203 kernel: audit: type=1300 audit(1712947828.880:1348): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ee9c850 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:28.880000 audit[4554]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd6ee9c850 a2=3 a3=0 items=0 ppid=1 pid=4554 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:28.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:28.963657 kernel: audit: type=1327 audit(1712947828.880:1348): proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:28.963818 kernel: audit: type=1105 audit(1712947828.911:1349): pid=4554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:28.911000 audit[4554]: USER_START pid=4554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:28.914000 audit[4556]: CRED_ACQ pid=4556 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:29.021131 kernel: audit: type=1103 audit(1712947828.914:1350): pid=4556 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:29.219699 sshd[4554]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:29.221000 audit[4554]: USER_END pid=4554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:29.222000 audit[4554]: CRED_DISP pid=4554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:29.257395 systemd[1]: sshd@9-10.128.0.18:22-139.178.89.65:34934.service: Deactivated successfully. Apr 12 18:50:29.258640 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:50:29.261403 systemd-logind[1136]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:50:29.263161 systemd-logind[1136]: Removed session 10. Apr 12 18:50:29.279807 kernel: audit: type=1106 audit(1712947829.221:1351): pid=4554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:29.279933 kernel: audit: type=1104 audit(1712947829.222:1352): pid=4554 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:29.256000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.18:22-139.178.89.65:34934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:30.395000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:30.395000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:30.395000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d774a0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:50:30.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:50:30.395000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000218c20 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:50:30.395000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:50:30.396000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:30.396000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d777e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:50:30.396000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:50:30.398000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:50:30.398000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002194e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:50:30.398000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:50:34.305981 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:50:34.306237 kernel: audit: type=1130 audit(1712947834.274:1358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.18:22-139.178.89.65:34946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:34.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.18:22-139.178.89.65:34946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:34.275744 systemd[1]: Started sshd@10-10.128.0.18:22-139.178.89.65:34946.service. Apr 12 18:50:34.657271 kernel: audit: type=1101 audit(1712947834.626:1359): pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.626000 audit[4575]: USER_ACCT pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.658296 sshd[4575]: Accepted publickey for core from 139.178.89.65 port 34946 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:34.658909 sshd[4575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:34.657000 audit[4575]: CRED_ACQ pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.667258 systemd[1]: Started session-11.scope. Apr 12 18:50:34.668924 systemd-logind[1136]: New session 11 of user core. Apr 12 18:50:34.685544 kernel: audit: type=1103 audit(1712947834.657:1360): pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.685684 kernel: audit: type=1006 audit(1712947834.657:1361): pid=4575 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:50:34.657000 audit[4575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff15a3960 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:34.702290 kernel: audit: type=1300 audit(1712947834.657:1361): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff15a3960 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:34.657000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:34.731218 kernel: audit: type=1327 audit(1712947834.657:1361): proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:34.740733 kernel: audit: type=1105 audit(1712947834.677:1362): pid=4575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.677000 audit[4575]: USER_START pid=4575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.682000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.796745 kernel: audit: type=1103 audit(1712947834.682:1363): pid=4578 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.988739 sshd[4575]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:34.989000 audit[4575]: USER_END pid=4575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:34.994174 systemd[1]: sshd@10-10.128.0.18:22-139.178.89.65:34946.service: Deactivated successfully. Apr 12 18:50:34.995399 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:50:34.999115 systemd-logind[1136]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:50:35.000828 systemd-logind[1136]: Removed session 11. Apr 12 18:50:34.990000 audit[4575]: CRED_DISP pid=4575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:35.048352 kernel: audit: type=1106 audit(1712947834.989:1364): pid=4575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:35.048498 kernel: audit: type=1104 audit(1712947834.990:1365): pid=4575 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:35.049536 systemd[1]: Started sshd@11-10.128.0.18:22-139.178.89.65:34952.service. Apr 12 18:50:34.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.18:22-139.178.89.65:34946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:35.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.18:22-139.178.89.65:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:35.394000 audit[4589]: USER_ACCT pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:35.396408 sshd[4589]: Accepted publickey for core from 139.178.89.65 port 34952 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:35.397000 audit[4589]: CRED_ACQ pid=4589 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:35.397000 audit[4589]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9c0e7540 a2=3 a3=0 items=0 ppid=1 pid=4589 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:35.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:35.398851 sshd[4589]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:35.405145 systemd-logind[1136]: New session 12 of user core. Apr 12 18:50:35.405920 systemd[1]: Started session-12.scope. Apr 12 18:50:35.413000 audit[4589]: USER_START pid=4589 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:35.416000 audit[4591]: CRED_ACQ pid=4591 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.124043 sshd[4589]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:36.126000 audit[4589]: USER_END pid=4589 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.126000 audit[4589]: CRED_DISP pid=4589 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.128697 systemd[1]: sshd@11-10.128.0.18:22-139.178.89.65:34952.service: Deactivated successfully. Apr 12 18:50:36.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.18:22-139.178.89.65:34952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:36.130035 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:50:36.131121 systemd-logind[1136]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:50:36.132488 systemd-logind[1136]: Removed session 12. Apr 12 18:50:36.181420 systemd[1]: Started sshd@12-10.128.0.18:22-139.178.89.65:34956.service. Apr 12 18:50:36.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.18:22-139.178.89.65:34956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:36.527000 audit[4599]: USER_ACCT pid=4599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.528447 sshd[4599]: Accepted publickey for core from 139.178.89.65 port 34956 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:36.529000 audit[4599]: CRED_ACQ pid=4599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.530000 audit[4599]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0a982510 a2=3 a3=0 items=0 ppid=1 pid=4599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:36.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:36.530789 sshd[4599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:36.537514 systemd-logind[1136]: New session 13 of user core. Apr 12 18:50:36.538286 systemd[1]: Started session-13.scope. Apr 12 18:50:36.550000 audit[4599]: USER_START pid=4599 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.552000 audit[4601]: CRED_ACQ pid=4601 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.865876 sshd[4599]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:36.866000 audit[4599]: USER_END pid=4599 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.866000 audit[4599]: CRED_DISP pid=4599 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:36.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.18:22-139.178.89.65:34956 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:36.871523 systemd[1]: sshd@12-10.128.0.18:22-139.178.89.65:34956.service: Deactivated successfully. Apr 12 18:50:36.872655 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:50:36.874166 systemd-logind[1136]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:50:36.875382 systemd-logind[1136]: Removed session 13. Apr 12 18:50:41.952502 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:50:41.952691 kernel: audit: type=1130 audit(1712947841.921:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.18:22-139.178.89.65:54248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.18:22-139.178.89.65:54248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:41.922177 systemd[1]: Started sshd@13-10.128.0.18:22-139.178.89.65:54248.service. Apr 12 18:50:42.269000 audit[4623]: USER_ACCT pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.272558 sshd[4623]: Accepted publickey for core from 139.178.89.65 port 54248 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:42.299000 audit[4623]: CRED_ACQ pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.301753 sshd[4623]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:42.315674 systemd[1]: Started session-14.scope. Apr 12 18:50:42.317239 systemd-logind[1136]: New session 14 of user core. Apr 12 18:50:42.326506 kernel: audit: type=1101 audit(1712947842.269:1386): pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.326620 kernel: audit: type=1103 audit(1712947842.299:1387): pid=4623 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.300000 audit[4623]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a0286c0 a2=3 a3=0 items=0 ppid=1 pid=4623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:42.372163 kernel: audit: type=1006 audit(1712947842.300:1388): pid=4623 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:50:42.372366 kernel: audit: type=1300 audit(1712947842.300:1388): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3a0286c0 a2=3 a3=0 items=0 ppid=1 pid=4623 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:42.300000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:42.381915 kernel: audit: type=1327 audit(1712947842.300:1388): proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:42.382165 kernel: audit: type=1105 audit(1712947842.325:1389): pid=4623 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.325000 audit[4623]: USER_START pid=4623 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.329000 audit[4630]: CRED_ACQ pid=4630 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.440056 kernel: audit: type=1103 audit(1712947842.329:1390): pid=4630 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.680319 sshd[4623]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:42.682000 audit[4623]: USER_END pid=4623 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.686110 systemd[1]: sshd@13-10.128.0.18:22-139.178.89.65:54248.service: Deactivated successfully. Apr 12 18:50:42.687452 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:50:42.689634 systemd-logind[1136]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:50:42.691316 systemd-logind[1136]: Removed session 14. Apr 12 18:50:42.682000 audit[4623]: CRED_DISP pid=4623 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.739819 kernel: audit: type=1106 audit(1712947842.682:1391): pid=4623 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.739986 kernel: audit: type=1104 audit(1712947842.682:1392): pid=4623 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:42.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.18:22-139.178.89.65:54248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:42.797645 systemd[1]: run-containerd-runc-k8s.io-7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab-runc.aBr4xo.mount: Deactivated successfully. Apr 12 18:50:47.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.18:22-139.178.89.65:49122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:47.736863 systemd[1]: Started sshd@14-10.128.0.18:22-139.178.89.65:49122.service. Apr 12 18:50:47.742644 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:50:47.742810 kernel: audit: type=1130 audit(1712947847.736:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.18:22-139.178.89.65:49122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:48.091000 audit[4662]: USER_ACCT pid=4662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.095071 sshd[4662]: Accepted publickey for core from 139.178.89.65 port 49122 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:48.122229 kernel: audit: type=1101 audit(1712947848.091:1395): pid=4662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.123419 sshd[4662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:48.121000 audit[4662]: CRED_ACQ pid=4662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.134989 systemd-logind[1136]: New session 15 of user core. Apr 12 18:50:48.136070 systemd[1]: Started session-15.scope. Apr 12 18:50:48.173014 kernel: audit: type=1103 audit(1712947848.121:1396): pid=4662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.173201 kernel: audit: type=1006 audit(1712947848.121:1397): pid=4662 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:50:48.173258 kernel: audit: type=1300 audit(1712947848.121:1397): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeca738ac0 a2=3 a3=0 items=0 ppid=1 pid=4662 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:48.121000 audit[4662]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeca738ac0 a2=3 a3=0 items=0 ppid=1 pid=4662 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:48.121000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:48.210886 kernel: audit: type=1327 audit(1712947848.121:1397): proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:48.145000 audit[4662]: USER_START pid=4662 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.245177 kernel: audit: type=1105 audit(1712947848.145:1398): pid=4662 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.150000 audit[4664]: CRED_ACQ pid=4664 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.270172 kernel: audit: type=1103 audit(1712947848.150:1399): pid=4664 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.436231 sshd[4662]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:48.437000 audit[4662]: USER_END pid=4662 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.443347 systemd[1]: sshd@14-10.128.0.18:22-139.178.89.65:49122.service: Deactivated successfully. Apr 12 18:50:48.444564 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:50:48.448179 systemd-logind[1136]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:50:48.449909 systemd-logind[1136]: Removed session 15. Apr 12 18:50:48.472196 kernel: audit: type=1106 audit(1712947848.437:1400): pid=4662 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.472346 kernel: audit: type=1104 audit(1712947848.437:1401): pid=4662 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.437000 audit[4662]: CRED_DISP pid=4662 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:48.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.18:22-139.178.89.65:49122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:48.572000 audit[4693]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:48.572000 audit[4693]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc268f8cd0 a2=0 a3=7ffc268f8cbc items=0 ppid=2235 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:48.572000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:48.574000 audit[4693]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=4693 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:48.574000 audit[4693]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc268f8cd0 a2=0 a3=7ffc268f8cbc items=0 ppid=2235 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:48.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:48.684281 systemd[1]: run-containerd-runc-k8s.io-5b36b897560568b16ed10f3e9bb975a5ebb39bd8784fd4e853d2d3653ae2d2a8-runc.C4OE1D.mount: Deactivated successfully. Apr 12 18:50:48.792000 audit[4714]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:48.792000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffbdf79f70 a2=0 a3=7fffbdf79f5c items=0 ppid=2235 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:48.792000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:48.794000 audit[4714]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=4714 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:48.794000 audit[4714]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffbdf79f70 a2=0 a3=7fffbdf79f5c items=0 ppid=2235 pid=4714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:48.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:49.827080 systemd[1]: run-containerd-runc-k8s.io-49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe-runc.SHYpJ7.mount: Deactivated successfully. Apr 12 18:50:53.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.18:22-139.178.89.65:49136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:53.491590 systemd[1]: Started sshd@15-10.128.0.18:22-139.178.89.65:49136.service. Apr 12 18:50:53.497635 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:50:53.497726 kernel: audit: type=1130 audit(1712947853.491:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.18:22-139.178.89.65:49136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:53.844000 audit[4743]: USER_ACCT pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:53.846103 sshd[4743]: Accepted publickey for core from 139.178.89.65 port 49136 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:53.875138 kernel: audit: type=1101 audit(1712947853.844:1408): pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:53.876421 sshd[4743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:53.874000 audit[4743]: CRED_ACQ pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:53.903209 kernel: audit: type=1103 audit(1712947853.874:1409): pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:53.913378 systemd-logind[1136]: New session 16 of user core. Apr 12 18:50:53.914591 systemd[1]: Started session-16.scope. Apr 12 18:50:53.874000 audit[4743]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e18a910 a2=3 a3=0 items=0 ppid=1 pid=4743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:53.948780 kernel: audit: type=1006 audit(1712947853.874:1410): pid=4743 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:50:53.948986 kernel: audit: type=1300 audit(1712947853.874:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e18a910 a2=3 a3=0 items=0 ppid=1 pid=4743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:53.949042 kernel: audit: type=1327 audit(1712947853.874:1410): proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:53.874000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:53.961195 kernel: audit: type=1105 audit(1712947853.923:1411): pid=4743 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:53.923000 audit[4743]: USER_START pid=4743 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:53.928000 audit[4745]: CRED_ACQ pid=4745 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.018133 kernel: audit: type=1103 audit(1712947853.928:1412): pid=4745 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.222000 audit[4743]: USER_END pid=4743 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.222004 sshd[4743]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:54.263493 kernel: audit: type=1106 audit(1712947854.222:1413): pid=4743 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.261046 systemd[1]: sshd@15-10.128.0.18:22-139.178.89.65:49136.service: Deactivated successfully. Apr 12 18:50:54.262506 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:50:54.265027 systemd-logind[1136]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:50:54.225000 audit[4743]: CRED_DISP pid=4743 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.267921 systemd-logind[1136]: Removed session 16. Apr 12 18:50:54.294118 kernel: audit: type=1104 audit(1712947854.225:1414): pid=4743 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.18:22-139.178.89.65:49136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:54.296119 systemd[1]: Started sshd@16-10.128.0.18:22-139.178.89.65:49146.service. Apr 12 18:50:54.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.18:22-139.178.89.65:49146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:54.648000 audit[4755]: USER_ACCT pid=4755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.650120 sshd[4755]: Accepted publickey for core from 139.178.89.65 port 49146 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:54.651000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.651000 audit[4755]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0434b790 a2=3 a3=0 items=0 ppid=1 pid=4755 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:54.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:54.653692 sshd[4755]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:54.662229 systemd-logind[1136]: New session 17 of user core. Apr 12 18:50:54.663931 systemd[1]: Started session-17.scope. Apr 12 18:50:54.671000 audit[4755]: USER_START pid=4755 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:54.674000 audit[4757]: CRED_ACQ pid=4757 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:55.052905 sshd[4755]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:55.054000 audit[4755]: USER_END pid=4755 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:55.055000 audit[4755]: CRED_DISP pid=4755 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:55.059012 systemd[1]: sshd@16-10.128.0.18:22-139.178.89.65:49146.service: Deactivated successfully. Apr 12 18:50:55.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.18:22-139.178.89.65:49146 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:55.060406 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:50:55.061486 systemd-logind[1136]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:50:55.063015 systemd-logind[1136]: Removed session 17. Apr 12 18:50:55.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.18:22-139.178.89.65:49148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:55.105575 systemd[1]: Started sshd@17-10.128.0.18:22-139.178.89.65:49148.service. Apr 12 18:50:55.453000 audit[4765]: USER_ACCT pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:55.456222 sshd[4765]: Accepted publickey for core from 139.178.89.65 port 49148 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:55.455000 audit[4765]: CRED_ACQ pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:55.455000 audit[4765]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef02efad0 a2=3 a3=0 items=0 ppid=1 pid=4765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:55.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:55.457500 sshd[4765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:55.463811 systemd-logind[1136]: New session 18 of user core. Apr 12 18:50:55.464567 systemd[1]: Started session-18.scope. Apr 12 18:50:55.471000 audit[4765]: USER_START pid=4765 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:55.474000 audit[4767]: CRED_ACQ pid=4767 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:57.477000 audit[4777]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=4777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:57.477000 audit[4777]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd1867c130 a2=0 a3=7ffd1867c11c items=0 ppid=2235 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:57.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:57.479000 audit[4777]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4777 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:57.479000 audit[4777]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd1867c130 a2=0 a3=0 items=0 ppid=2235 pid=4777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:57.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:57.509000 audit[4779]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:57.509000 audit[4779]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd14d27ae0 a2=0 a3=7ffd14d27acc items=0 ppid=2235 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:57.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:57.511000 audit[4779]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:50:57.511000 audit[4779]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd14d27ae0 a2=0 a3=0 items=0 ppid=2235 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:57.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:50:57.528412 sshd[4765]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:57.529000 audit[4765]: USER_END pid=4765 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:57.530000 audit[4765]: CRED_DISP pid=4765 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:57.534618 systemd-logind[1136]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:50:57.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.18:22-139.178.89.65:49148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:57.535975 systemd[1]: sshd@17-10.128.0.18:22-139.178.89.65:49148.service: Deactivated successfully. Apr 12 18:50:57.537196 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:50:57.539398 systemd-logind[1136]: Removed session 18. Apr 12 18:50:57.582372 systemd[1]: Started sshd@18-10.128.0.18:22-139.178.89.65:34484.service. Apr 12 18:50:57.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.18:22-139.178.89.65:34484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:57.937000 audit[4782]: USER_ACCT pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:57.940847 sshd[4782]: Accepted publickey for core from 139.178.89.65 port 34484 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:57.939000 audit[4782]: CRED_ACQ pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:57.940000 audit[4782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc46ec3a0 a2=3 a3=0 items=0 ppid=1 pid=4782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:57.940000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:57.941830 sshd[4782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:57.949169 systemd[1]: Started session-19.scope. Apr 12 18:50:57.950548 systemd-logind[1136]: New session 19 of user core. Apr 12 18:50:57.958000 audit[4782]: USER_START pid=4782 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:57.960000 audit[4784]: CRED_ACQ pid=4784 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:58.616397 sshd[4782]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:58.628022 kernel: kauditd_printk_skb: 43 callbacks suppressed Apr 12 18:50:58.628193 kernel: audit: type=1106 audit(1712947858.617:1444): pid=4782 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:58.617000 audit[4782]: USER_END pid=4782 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:58.622111 systemd-logind[1136]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:50:58.623960 systemd[1]: sshd@18-10.128.0.18:22-139.178.89.65:34484.service: Deactivated successfully. Apr 12 18:50:58.625166 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:50:58.627324 systemd-logind[1136]: Removed session 19. Apr 12 18:50:58.617000 audit[4782]: CRED_DISP pid=4782 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:58.657136 kernel: audit: type=1104 audit(1712947858.617:1445): pid=4782 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:58.674049 systemd[1]: Started sshd@19-10.128.0.18:22-139.178.89.65:34486.service. Apr 12 18:50:58.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.18:22-139.178.89.65:34484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:58.708184 kernel: audit: type=1131 audit(1712947858.623:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.18:22-139.178.89.65:34484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:58.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.18:22-139.178.89.65:34486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:58.734142 kernel: audit: type=1130 audit(1712947858.680:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.18:22-139.178.89.65:34486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:59.065460 kernel: audit: type=1101 audit(1712947859.033:1448): pid=4792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.033000 audit[4792]: USER_ACCT pid=4792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.065807 sshd[4792]: Accepted publickey for core from 139.178.89.65 port 34486 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:50:59.066341 sshd[4792]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:50:59.064000 audit[4792]: CRED_ACQ pid=4792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.095801 kernel: audit: type=1103 audit(1712947859.064:1449): pid=4792 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.116121 kernel: audit: type=1006 audit(1712947859.064:1450): pid=4792 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 18:50:59.064000 audit[4792]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7257f360 a2=3 a3=0 items=0 ppid=1 pid=4792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:59.064000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:59.150030 systemd[1]: Started session-20.scope. Apr 12 18:50:59.152164 systemd-logind[1136]: New session 20 of user core. Apr 12 18:50:59.154957 kernel: audit: type=1300 audit(1712947859.064:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7257f360 a2=3 a3=0 items=0 ppid=1 pid=4792 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:50:59.155055 kernel: audit: type=1327 audit(1712947859.064:1450): proctitle=737368643A20636F7265205B707269765D Apr 12 18:50:59.160000 audit[4792]: USER_START pid=4792 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.166000 audit[4796]: CRED_ACQ pid=4796 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.195337 kernel: audit: type=1105 audit(1712947859.160:1451): pid=4792 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.446992 sshd[4792]: pam_unix(sshd:session): session closed for user core Apr 12 18:50:59.449000 audit[4792]: USER_END pid=4792 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.449000 audit[4792]: CRED_DISP pid=4792 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:50:59.452611 systemd[1]: sshd@19-10.128.0.18:22-139.178.89.65:34486.service: Deactivated successfully. Apr 12 18:50:59.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.18:22-139.178.89.65:34486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:50:59.453766 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:50:59.454692 systemd-logind[1136]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:50:59.455926 systemd-logind[1136]: Removed session 20. Apr 12 18:51:04.534309 kernel: kauditd_printk_skb: 4 callbacks suppressed Apr 12 18:51:04.535807 kernel: audit: type=1130 audit(1712947864.503:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.18:22-139.178.89.65:34488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:04.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.18:22-139.178.89.65:34488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:04.503820 systemd[1]: Started sshd@20-10.128.0.18:22-139.178.89.65:34488.service. Apr 12 18:51:04.853000 audit[4813]: USER_ACCT pid=4813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.855209 sshd[4813]: Accepted publickey for core from 139.178.89.65 port 34488 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:51:04.885135 kernel: audit: type=1101 audit(1712947864.853:1457): pid=4813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.885319 kernel: audit: type=1103 audit(1712947864.883:1458): pid=4813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.883000 audit[4813]: CRED_ACQ pid=4813 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.886106 sshd[4813]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:51:04.894790 systemd[1]: Started session-21.scope. Apr 12 18:51:04.896844 systemd-logind[1136]: New session 21 of user core. Apr 12 18:51:04.884000 audit[4813]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e1084c0 a2=3 a3=0 items=0 ppid=1 pid=4813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:04.928186 kernel: audit: type=1006 audit(1712947864.884:1459): pid=4813 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:51:04.928254 kernel: audit: type=1300 audit(1712947864.884:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2e1084c0 a2=3 a3=0 items=0 ppid=1 pid=4813 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:04.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:04.957127 kernel: audit: type=1327 audit(1712947864.884:1459): proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:04.904000 audit[4813]: USER_START pid=4813 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.998148 kernel: audit: type=1105 audit(1712947864.904:1460): pid=4813 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.999416 kernel: audit: type=1103 audit(1712947864.909:1461): pid=4815 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:04.909000 audit[4815]: CRED_ACQ pid=4815 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:05.182843 sshd[4813]: pam_unix(sshd:session): session closed for user core Apr 12 18:51:05.183000 audit[4813]: USER_END pid=4813 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:05.189343 systemd-logind[1136]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:51:05.191825 systemd[1]: sshd@20-10.128.0.18:22-139.178.89.65:34488.service: Deactivated successfully. Apr 12 18:51:05.193301 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:51:05.196430 systemd-logind[1136]: Removed session 21. Apr 12 18:51:05.184000 audit[4813]: CRED_DISP pid=4813 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:05.261187 kernel: audit: type=1106 audit(1712947865.183:1462): pid=4813 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:05.261350 kernel: audit: type=1104 audit(1712947865.184:1463): pid=4813 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:05.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.18:22-139.178.89.65:34488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:06.312000 audit[4825]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=4825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:51:06.312000 audit[4825]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaf84c150 a2=0 a3=7ffeaf84c13c items=0 ppid=2235 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:06.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:51:06.316000 audit[4825]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=4825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:51:06.316000 audit[4825]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffeaf84c150 a2=0 a3=7ffeaf84c13c items=0 ppid=2235 pid=4825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:06.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:51:10.260317 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:51:10.260566 kernel: audit: type=1130 audit(1712947870.245:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.18:22-139.178.89.65:47228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:10.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.18:22-139.178.89.65:47228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:10.246116 systemd[1]: Started sshd@21-10.128.0.18:22-139.178.89.65:47228.service. Apr 12 18:51:10.626145 sshd[4828]: Accepted publickey for core from 139.178.89.65 port 47228 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:51:10.627018 sshd[4828]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:51:10.623000 audit[4828]: USER_ACCT pid=4828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.639024 systemd[1]: Started session-22.scope. Apr 12 18:51:10.641172 systemd-logind[1136]: New session 22 of user core. Apr 12 18:51:10.657494 kernel: audit: type=1101 audit(1712947870.623:1468): pid=4828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.625000 audit[4828]: CRED_ACQ pid=4828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.685576 kernel: audit: type=1103 audit(1712947870.625:1469): pid=4828 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.685725 kernel: audit: type=1006 audit(1712947870.625:1470): pid=4828 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:51:10.625000 audit[4828]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4abbfa30 a2=3 a3=0 items=0 ppid=1 pid=4828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:10.625000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:10.741407 kernel: audit: type=1300 audit(1712947870.625:1470): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4abbfa30 a2=3 a3=0 items=0 ppid=1 pid=4828 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:10.741591 kernel: audit: type=1327 audit(1712947870.625:1470): proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:10.741633 kernel: audit: type=1105 audit(1712947870.650:1471): pid=4828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.650000 audit[4828]: USER_START pid=4828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.660000 audit[4830]: CRED_ACQ pid=4830 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:10.797788 kernel: audit: type=1103 audit(1712947870.660:1472): pid=4830 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:11.008376 sshd[4828]: pam_unix(sshd:session): session closed for user core Apr 12 18:51:11.009000 audit[4828]: USER_END pid=4828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:11.014110 systemd[1]: sshd@21-10.128.0.18:22-139.178.89.65:47228.service: Deactivated successfully. Apr 12 18:51:11.015391 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:51:11.018388 systemd-logind[1136]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:51:11.020188 systemd-logind[1136]: Removed session 22. Apr 12 18:51:11.044153 kernel: audit: type=1106 audit(1712947871.009:1473): pid=4828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:11.009000 audit[4828]: CRED_DISP pid=4828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:11.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.18:22-139.178.89.65:47228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:11.072241 kernel: audit: type=1104 audit(1712947871.009:1474): pid=4828 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:12.813150 systemd[1]: run-containerd-runc-k8s.io-7c6d5cfc78fa5e604d584ff48e2f678128dc94267043e3af0c7d89ab468faaab-runc.cBEJsg.mount: Deactivated successfully. Apr 12 18:51:12.857000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=526945 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:12.857000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0103f4540 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:51:12.857000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:51:12.858000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:12.858000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0103f4660 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:51:12.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:51:12.859000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:12.859000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c014ce4040 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:51:12.859000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:51:12.890000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=526951 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:12.890000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c012c5c030 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:51:12.890000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:51:12.896000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:12.896000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c011555d20 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:51:12.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:51:12.896000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:12.896000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c012c5c090 a2=fc6 a3=0 items=0 ppid=1799 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c916,c919 key=(null) Apr 12 18:51:12.896000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3138002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Apr 12 18:51:13.740000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=526949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:13.740000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=526934 scontext=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:51:13.740000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000feb720 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:51:13.740000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:51:13.740000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b6c7e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c215,c987 key=(null) Apr 12 18:51:13.740000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:51:16.095110 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:51:16.095290 kernel: audit: type=1130 audit(1712947876.064:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.18:22-139.178.89.65:47232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:16.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.18:22-139.178.89.65:47232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:16.064787 systemd[1]: Started sshd@22-10.128.0.18:22-139.178.89.65:47232.service. Apr 12 18:51:16.416000 audit[4867]: USER_ACCT pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.447008 sshd[4867]: Accepted publickey for core from 139.178.89.65 port 47232 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:51:16.447534 kernel: audit: type=1101 audit(1712947876.416:1485): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.447000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.449385 sshd[4867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:51:16.457632 systemd[1]: Started session-23.scope. Apr 12 18:51:16.459900 systemd-logind[1136]: New session 23 of user core. Apr 12 18:51:16.490340 kernel: audit: type=1103 audit(1712947876.447:1486): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.490469 kernel: audit: type=1006 audit(1712947876.447:1487): pid=4867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:51:16.447000 audit[4867]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2cd5c170 a2=3 a3=0 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:16.518962 kernel: audit: type=1300 audit(1712947876.447:1487): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2cd5c170 a2=3 a3=0 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:16.519372 kernel: audit: type=1327 audit(1712947876.447:1487): proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:16.447000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:16.474000 audit[4867]: USER_START pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.561107 kernel: audit: type=1105 audit(1712947876.474:1488): pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.561299 kernel: audit: type=1103 audit(1712947876.478:1489): pid=4869 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.478000 audit[4869]: CRED_ACQ pid=4869 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.772906 sshd[4867]: pam_unix(sshd:session): session closed for user core Apr 12 18:51:16.773000 audit[4867]: USER_END pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.807320 kernel: audit: type=1106 audit(1712947876.773:1490): pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.807505 kernel: audit: type=1104 audit(1712947876.773:1491): pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.773000 audit[4867]: CRED_DISP pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:16.809424 systemd[1]: sshd@22-10.128.0.18:22-139.178.89.65:47232.service: Deactivated successfully. Apr 12 18:51:16.810637 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:51:16.812331 systemd-logind[1136]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:51:16.813987 systemd-logind[1136]: Removed session 23. Apr 12 18:51:16.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.18:22-139.178.89.65:47232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:18.424998 systemd[1]: run-containerd-runc-k8s.io-c2abc06127a542442ef84dbbec8b170f68d547f241c01164877ff5fc7d9c5aa0-runc.FqviLB.mount: Deactivated successfully. Apr 12 18:51:19.824346 systemd[1]: run-containerd-runc-k8s.io-49b8905e84ffb9fd3e2f5780d6ccf609277aedd824b2a64a49019a079c9c11fe-runc.XM0phB.mount: Deactivated successfully. Apr 12 18:51:21.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.18:22-139.178.89.65:36872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:21.829040 systemd[1]: Started sshd@23-10.128.0.18:22-139.178.89.65:36872.service. Apr 12 18:51:21.834718 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:51:21.834978 kernel: audit: type=1130 audit(1712947881.828:1493): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.18:22-139.178.89.65:36872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:22.177000 audit[4947]: USER_ACCT pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.179830 sshd[4947]: Accepted publickey for core from 139.178.89.65 port 36872 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:51:22.208133 kernel: audit: type=1101 audit(1712947882.177:1494): pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.208637 sshd[4947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:51:22.207000 audit[4947]: CRED_ACQ pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.217614 systemd[1]: Started session-24.scope. Apr 12 18:51:22.219191 systemd-logind[1136]: New session 24 of user core. Apr 12 18:51:22.235162 kernel: audit: type=1103 audit(1712947882.207:1495): pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.207000 audit[4947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3e666b70 a2=3 a3=0 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:22.254275 kernel: audit: type=1006 audit(1712947882.207:1496): pid=4947 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:51:22.254350 kernel: audit: type=1300 audit(1712947882.207:1496): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3e666b70 a2=3 a3=0 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:51:22.207000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:22.284223 kernel: audit: type=1327 audit(1712947882.207:1496): proctitle=737368643A20636F7265205B707269765D Apr 12 18:51:22.229000 audit[4947]: USER_START pid=4947 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.325153 kernel: audit: type=1105 audit(1712947882.229:1497): pid=4947 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.236000 audit[4950]: CRED_ACQ pid=4950 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.349846 kernel: audit: type=1103 audit(1712947882.236:1498): pid=4950 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.522130 sshd[4947]: pam_unix(sshd:session): session closed for user core Apr 12 18:51:22.523000 audit[4947]: USER_END pid=4947 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.526484 systemd[1]: sshd@23-10.128.0.18:22-139.178.89.65:36872.service: Deactivated successfully. Apr 12 18:51:22.527723 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:51:22.530366 systemd-logind[1136]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:51:22.531957 systemd-logind[1136]: Removed session 24. Apr 12 18:51:22.523000 audit[4947]: CRED_DISP pid=4947 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.557132 kernel: audit: type=1106 audit(1712947882.523:1499): pid=4947 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.557196 kernel: audit: type=1104 audit(1712947882.523:1500): pid=4947 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:51:22.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.18:22-139.178.89.65:36872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:51:23.851000 audit[4482]: AVC avc: denied { watch } for pid=4482 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_50_18.510620110/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c129,c178 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c129,c178 tclass=file permissive=0 Apr 12 18:51:23.851000 audit[4482]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009d11a0 a2=fc6 a3=0 items=0 ppid=4369 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c129,c178 key=(null) Apr 12 18:51:23.851000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:51:24.075000 audit[4457]: AVC avc: denied { watch } for pid=4457 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_50_18.4019655148/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c636 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c636 tclass=file permissive=0 Apr 12 18:51:24.075000 audit[4457]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a38cc0 a2=fc6 a3=0 items=0 ppid=4297 pid=4457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c636 key=(null) Apr 12 18:51:24.075000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274