Apr 12 18:44:14.135607 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:44:14.135653 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:44:14.135670 kernel: BIOS-provided physical RAM map: Apr 12 18:44:14.135682 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Apr 12 18:44:14.135695 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Apr 12 18:44:14.135709 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Apr 12 18:44:14.135728 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Apr 12 18:44:14.135742 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Apr 12 18:44:14.135755 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Apr 12 18:44:14.135768 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Apr 12 18:44:14.135782 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Apr 12 18:44:14.135795 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Apr 12 18:44:14.135810 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Apr 12 18:44:14.135822 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Apr 12 18:44:14.135841 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Apr 12 18:44:14.135854 kernel: NX (Execute Disable) protection: active Apr 12 18:44:14.135868 kernel: efi: EFI v2.70 by EDK II Apr 12 18:44:14.135882 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe36f198 RNG=0xbfb73018 TPMEventLog=0xbe2b3018 Apr 12 18:44:14.135897 kernel: random: crng init done Apr 12 18:44:14.135910 kernel: SMBIOS 2.4 present. Apr 12 18:44:14.135925 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Apr 12 18:44:14.135938 kernel: Hypervisor detected: KVM Apr 12 18:44:14.135958 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:44:14.135971 kernel: kvm-clock: cpu 0, msr 20f191001, primary cpu clock Apr 12 18:44:14.135986 kernel: kvm-clock: using sched offset of 13461360914 cycles Apr 12 18:44:14.136001 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:44:14.136017 kernel: tsc: Detected 2299.998 MHz processor Apr 12 18:44:14.136032 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:44:14.136058 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:44:14.136074 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Apr 12 18:44:14.136099 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:44:14.136115 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Apr 12 18:44:14.136135 kernel: Using GB pages for direct mapping Apr 12 18:44:14.136151 kernel: Secure boot disabled Apr 12 18:44:14.136166 kernel: ACPI: Early table checksum verification disabled Apr 12 18:44:14.136181 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Apr 12 18:44:14.136196 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Apr 12 18:44:14.136210 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Apr 12 18:44:14.136224 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Apr 12 18:44:14.136239 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Apr 12 18:44:14.136265 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Apr 12 18:44:14.136282 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Apr 12 18:44:14.136316 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Apr 12 18:44:14.136330 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Apr 12 18:44:14.136345 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Apr 12 18:44:14.136361 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Apr 12 18:44:14.136380 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Apr 12 18:44:14.136396 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Apr 12 18:44:14.136436 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Apr 12 18:44:14.136450 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Apr 12 18:44:14.136464 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Apr 12 18:44:14.136479 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Apr 12 18:44:14.136492 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Apr 12 18:44:14.136508 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Apr 12 18:44:14.136524 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Apr 12 18:44:14.136545 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Apr 12 18:44:14.136560 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Apr 12 18:44:14.136577 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Apr 12 18:44:14.136593 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Apr 12 18:44:14.136610 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Apr 12 18:44:14.136626 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Apr 12 18:44:14.136643 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Apr 12 18:44:14.136659 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Apr 12 18:44:14.136676 kernel: Zone ranges: Apr 12 18:44:14.136696 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:44:14.136712 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Apr 12 18:44:14.136729 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:44:14.136745 kernel: Movable zone start for each node Apr 12 18:44:14.136761 kernel: Early memory node ranges Apr 12 18:44:14.136777 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Apr 12 18:44:14.136793 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Apr 12 18:44:14.136818 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Apr 12 18:44:14.136835 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Apr 12 18:44:14.136855 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Apr 12 18:44:14.136872 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Apr 12 18:44:14.136888 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:44:14.136905 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Apr 12 18:44:14.136921 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Apr 12 18:44:14.136938 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Apr 12 18:44:14.136953 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Apr 12 18:44:14.136969 kernel: ACPI: PM-Timer IO Port: 0xb008 Apr 12 18:44:14.136985 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:44:14.137006 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:44:14.137022 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:44:14.137038 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:44:14.137062 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:44:14.137079 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:44:14.137096 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:44:14.137112 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Apr 12 18:44:14.137129 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Apr 12 18:44:14.137144 kernel: Booting paravirtualized kernel on KVM Apr 12 18:44:14.137164 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:44:14.137181 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Apr 12 18:44:14.137197 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Apr 12 18:44:14.137214 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Apr 12 18:44:14.137229 kernel: pcpu-alloc: [0] 0 1 Apr 12 18:44:14.137246 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:44:14.137263 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:44:14.137279 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Apr 12 18:44:14.137316 kernel: Policy zone: Normal Apr 12 18:44:14.137338 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:44:14.137360 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:44:14.137375 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Apr 12 18:44:14.137390 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:44:14.137411 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:44:14.137427 kernel: Memory: 7534432K/7860584K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 325892K reserved, 0K cma-reserved) Apr 12 18:44:14.137443 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Apr 12 18:44:14.137459 kernel: Kernel/User page tables isolation: enabled Apr 12 18:44:14.137479 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:44:14.137494 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:44:14.137510 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:44:14.137527 kernel: rcu: RCU event tracing is enabled. Apr 12 18:44:14.137543 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Apr 12 18:44:14.137559 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:44:14.137575 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:44:14.137592 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:44:14.137607 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Apr 12 18:44:14.137627 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Apr 12 18:44:14.137655 kernel: Console: colour dummy device 80x25 Apr 12 18:44:14.137670 kernel: printk: console [ttyS0] enabled Apr 12 18:44:14.137688 kernel: ACPI: Core revision 20210730 Apr 12 18:44:14.137705 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:44:14.137721 kernel: x2apic enabled Apr 12 18:44:14.137739 kernel: Switched APIC routing to physical x2apic. Apr 12 18:44:14.137757 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Apr 12 18:44:14.137774 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:44:14.137791 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Apr 12 18:44:14.137811 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Apr 12 18:44:14.137827 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Apr 12 18:44:14.137846 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:44:14.137864 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Apr 12 18:44:14.137881 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Apr 12 18:44:14.137899 kernel: Spectre V2 : Mitigation: IBRS Apr 12 18:44:14.137921 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:44:14.137940 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:44:14.137957 kernel: RETBleed: Mitigation: IBRS Apr 12 18:44:14.137984 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:44:14.138002 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Apr 12 18:44:14.138020 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:44:14.138035 kernel: MDS: Mitigation: Clear CPU buffers Apr 12 18:44:14.138056 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Apr 12 18:44:14.138070 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:44:14.138089 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:44:14.138105 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:44:14.138121 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:44:14.138138 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:44:14.138154 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:44:14.138172 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:44:14.138188 kernel: LSM: Security Framework initializing Apr 12 18:44:14.138204 kernel: SELinux: Initializing. Apr 12 18:44:14.138221 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:44:14.138242 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Apr 12 18:44:14.138259 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Apr 12 18:44:14.138275 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Apr 12 18:44:14.138292 kernel: signal: max sigframe size: 1776 Apr 12 18:44:14.138323 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:44:14.138340 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Apr 12 18:44:14.138355 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:44:14.138373 kernel: x86: Booting SMP configuration: Apr 12 18:44:14.138390 kernel: .... node #0, CPUs: #1 Apr 12 18:44:14.138410 kernel: kvm-clock: cpu 1, msr 20f191041, secondary cpu clock Apr 12 18:44:14.138427 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Apr 12 18:44:14.138445 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Apr 12 18:44:14.138462 kernel: smp: Brought up 1 node, 2 CPUs Apr 12 18:44:14.138478 kernel: smpboot: Max logical packages: 1 Apr 12 18:44:14.138495 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Apr 12 18:44:14.138511 kernel: devtmpfs: initialized Apr 12 18:44:14.138527 kernel: x86/mm: Memory block size: 128MB Apr 12 18:44:14.138544 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Apr 12 18:44:14.138565 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:44:14.138581 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Apr 12 18:44:14.138598 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:44:14.138614 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:44:14.138631 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:44:14.138648 kernel: audit: type=2000 audit(1712947452.850:1): state=initialized audit_enabled=0 res=1 Apr 12 18:44:14.138663 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:44:14.138680 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:44:14.138700 kernel: cpuidle: using governor menu Apr 12 18:44:14.138717 kernel: ACPI: bus type PCI registered Apr 12 18:44:14.138735 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:44:14.138752 kernel: dca service started, version 1.12.1 Apr 12 18:44:14.138768 kernel: PCI: Using configuration type 1 for base access Apr 12 18:44:14.138784 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:44:14.138801 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:44:14.138817 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:44:14.138834 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:44:14.138850 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:44:14.138870 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:44:14.138887 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:44:14.138903 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:44:14.138919 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:44:14.138937 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:44:14.138953 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Apr 12 18:44:14.138969 kernel: ACPI: Interpreter enabled Apr 12 18:44:14.138985 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:44:14.139001 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:44:14.139021 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:44:14.139038 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Apr 12 18:44:14.139060 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:44:14.139333 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:44:14.139507 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Apr 12 18:44:14.139531 kernel: PCI host bridge to bus 0000:00 Apr 12 18:44:14.139695 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:44:14.139853 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:44:14.140009 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:44:14.140176 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Apr 12 18:44:14.140340 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:44:14.140526 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:44:14.140722 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Apr 12 18:44:14.140905 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:44:14.141081 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Apr 12 18:44:14.141259 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Apr 12 18:44:14.141445 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Apr 12 18:44:14.141613 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Apr 12 18:44:14.141793 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:44:14.141959 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Apr 12 18:44:14.142140 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Apr 12 18:44:14.147427 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:44:14.147639 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:44:14.147806 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Apr 12 18:44:14.147827 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:44:14.147845 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:44:14.147860 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:44:14.147883 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:44:14.147900 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:44:14.147917 kernel: iommu: Default domain type: Translated Apr 12 18:44:14.147933 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:44:14.147950 kernel: vgaarb: loaded Apr 12 18:44:14.147967 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:44:14.147985 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:44:14.148002 kernel: PTP clock support registered Apr 12 18:44:14.148018 kernel: Registered efivars operations Apr 12 18:44:14.148038 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:44:14.148063 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:44:14.148080 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Apr 12 18:44:14.148096 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Apr 12 18:44:14.148112 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Apr 12 18:44:14.148128 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Apr 12 18:44:14.148144 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:44:14.148161 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:44:14.148178 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:44:14.148199 kernel: pnp: PnP ACPI init Apr 12 18:44:14.148216 kernel: pnp: PnP ACPI: found 7 devices Apr 12 18:44:14.148232 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:44:14.148249 kernel: NET: Registered PF_INET protocol family Apr 12 18:44:14.148265 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Apr 12 18:44:14.148281 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Apr 12 18:44:14.148310 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:44:14.148328 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:44:14.148346 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Apr 12 18:44:14.148368 kernel: TCP: Hash tables configured (established 65536 bind 65536) Apr 12 18:44:14.148386 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:44:14.148404 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Apr 12 18:44:14.148421 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:44:14.148440 kernel: NET: Registered PF_XDP protocol family Apr 12 18:44:14.148607 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:44:14.148771 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:44:14.148921 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:44:14.149100 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Apr 12 18:44:14.149265 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:44:14.149287 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:44:14.149328 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Apr 12 18:44:14.149346 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Apr 12 18:44:14.149363 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Apr 12 18:44:14.149380 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Apr 12 18:44:14.149397 kernel: clocksource: Switched to clocksource tsc Apr 12 18:44:14.149419 kernel: Initialise system trusted keyrings Apr 12 18:44:14.149436 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Apr 12 18:44:14.149452 kernel: Key type asymmetric registered Apr 12 18:44:14.149469 kernel: Asymmetric key parser 'x509' registered Apr 12 18:44:14.149485 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:44:14.149502 kernel: io scheduler mq-deadline registered Apr 12 18:44:14.149519 kernel: io scheduler kyber registered Apr 12 18:44:14.149537 kernel: io scheduler bfq registered Apr 12 18:44:14.149554 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:44:14.149576 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:44:14.149742 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Apr 12 18:44:14.149764 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:44:14.149920 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Apr 12 18:44:14.149942 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:44:14.150105 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Apr 12 18:44:14.150126 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:44:14.150143 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:44:14.150159 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Apr 12 18:44:14.150181 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Apr 12 18:44:14.150198 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Apr 12 18:44:14.150374 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Apr 12 18:44:14.150398 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:44:14.150415 kernel: i8042: Warning: Keylock active Apr 12 18:44:14.150431 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:44:14.150449 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:44:14.150608 kernel: rtc_cmos 00:00: RTC can wake from S4 Apr 12 18:44:14.150759 kernel: rtc_cmos 00:00: registered as rtc0 Apr 12 18:44:14.150906 kernel: rtc_cmos 00:00: setting system clock to 2024-04-12T18:44:13 UTC (1712947453) Apr 12 18:44:14.151075 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Apr 12 18:44:14.151096 kernel: intel_pstate: CPU model not supported Apr 12 18:44:14.151113 kernel: pstore: Registered efi as persistent store backend Apr 12 18:44:14.151130 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:44:14.151147 kernel: Segment Routing with IPv6 Apr 12 18:44:14.151163 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:44:14.151184 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:44:14.151201 kernel: Key type dns_resolver registered Apr 12 18:44:14.151217 kernel: IPI shorthand broadcast: enabled Apr 12 18:44:14.151234 kernel: sched_clock: Marking stable (760153953, 170336020)->(976691816, -46201843) Apr 12 18:44:14.151251 kernel: registered taskstats version 1 Apr 12 18:44:14.151268 kernel: Loading compiled-in X.509 certificates Apr 12 18:44:14.151284 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:44:14.151313 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:44:14.151330 kernel: Key type .fscrypt registered Apr 12 18:44:14.151350 kernel: Key type fscrypt-provisioning registered Apr 12 18:44:14.151367 kernel: pstore: Using crash dump compression: deflate Apr 12 18:44:14.151384 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:44:14.151401 kernel: ima: No architecture policies found Apr 12 18:44:14.151418 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:44:14.151435 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:44:14.151452 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:44:14.151469 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:44:14.151489 kernel: Run /init as init process Apr 12 18:44:14.151506 kernel: with arguments: Apr 12 18:44:14.151523 kernel: /init Apr 12 18:44:14.151539 kernel: with environment: Apr 12 18:44:14.151556 kernel: HOME=/ Apr 12 18:44:14.151572 kernel: TERM=linux Apr 12 18:44:14.151589 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:44:14.151610 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:44:14.151634 systemd[1]: Detected virtualization kvm. Apr 12 18:44:14.151652 systemd[1]: Detected architecture x86-64. Apr 12 18:44:14.151670 systemd[1]: Running in initrd. Apr 12 18:44:14.151687 systemd[1]: No hostname configured, using default hostname. Apr 12 18:44:14.151705 systemd[1]: Hostname set to . Apr 12 18:44:14.151723 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:44:14.151741 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:44:14.151758 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:44:14.151797 systemd[1]: Reached target cryptsetup.target. Apr 12 18:44:14.151815 systemd[1]: Reached target paths.target. Apr 12 18:44:14.151832 systemd[1]: Reached target slices.target. Apr 12 18:44:14.151850 systemd[1]: Reached target swap.target. Apr 12 18:44:14.151867 systemd[1]: Reached target timers.target. Apr 12 18:44:14.151886 systemd[1]: Listening on iscsid.socket. Apr 12 18:44:14.151904 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:44:14.151921 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:44:14.151942 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:44:14.151960 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:44:14.151978 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:44:14.151996 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:44:14.152014 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:44:14.152031 systemd[1]: Reached target sockets.target. Apr 12 18:44:14.152056 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:44:14.152073 systemd[1]: Finished network-cleanup.service. Apr 12 18:44:14.152094 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:44:14.152112 systemd[1]: Starting systemd-journald.service... Apr 12 18:44:14.152130 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:44:14.152163 systemd[1]: Starting systemd-resolved.service... Apr 12 18:44:14.152183 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:44:14.152197 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:44:14.152214 kernel: audit: type=1130 audit(1712947454.142:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.152234 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:44:14.152257 systemd-journald[189]: Journal started Apr 12 18:44:14.152363 systemd-journald[189]: Runtime Journal (/run/log/journal/4d7aa8f9386ed82f9cbc025ba06003e9) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:44:14.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.159366 kernel: audit: type=1130 audit(1712947454.151:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.159428 systemd[1]: Started systemd-journald.service. Apr 12 18:44:14.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.160642 systemd-modules-load[190]: Inserted module 'overlay' Apr 12 18:44:14.170485 kernel: audit: type=1130 audit(1712947454.160:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.166516 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:44:14.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.179892 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:44:14.185349 kernel: audit: type=1130 audit(1712947454.177:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.185824 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:44:14.191070 systemd-resolved[191]: Positive Trust Anchors: Apr 12 18:44:14.191090 systemd-resolved[191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:44:14.191154 systemd-resolved[191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:44:14.196139 systemd-resolved[191]: Defaulting to hostname 'linux'. Apr 12 18:44:14.199561 systemd[1]: Started systemd-resolved.service. Apr 12 18:44:14.199809 systemd[1]: Reached target nss-lookup.target. Apr 12 18:44:14.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.205226 kernel: audit: type=1130 audit(1712947454.198:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.218741 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:44:14.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.224414 kernel: audit: type=1130 audit(1712947454.217:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.230134 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:44:14.238666 kernel: audit: type=1130 audit(1712947454.232:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.239093 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:44:14.245317 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:44:14.254527 systemd-modules-load[190]: Inserted module 'br_netfilter' Apr 12 18:44:14.258452 kernel: Bridge firewalling registered Apr 12 18:44:14.259531 dracut-cmdline[205]: dracut-dracut-053 Apr 12 18:44:14.263917 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:44:14.288325 kernel: SCSI subsystem initialized Apr 12 18:44:14.306324 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:44:14.308479 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:44:14.308542 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:44:14.313544 systemd-modules-load[190]: Inserted module 'dm_multipath' Apr 12 18:44:14.315468 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:44:14.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.327741 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:44:14.337448 kernel: audit: type=1130 audit(1712947454.325:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.341640 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:44:14.352469 kernel: audit: type=1130 audit(1712947454.344:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.371343 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:44:14.392353 kernel: iscsi: registered transport (tcp) Apr 12 18:44:14.419634 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:44:14.419741 kernel: QLogic iSCSI HBA Driver Apr 12 18:44:14.465865 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:44:14.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.468486 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:44:14.528376 kernel: raid6: avx2x4 gen() 17958 MB/s Apr 12 18:44:14.545348 kernel: raid6: avx2x4 xor() 6954 MB/s Apr 12 18:44:14.563368 kernel: raid6: avx2x2 gen() 18104 MB/s Apr 12 18:44:14.580368 kernel: raid6: avx2x2 xor() 18130 MB/s Apr 12 18:44:14.597370 kernel: raid6: avx2x1 gen() 13921 MB/s Apr 12 18:44:14.618363 kernel: raid6: avx2x1 xor() 16119 MB/s Apr 12 18:44:14.639387 kernel: raid6: sse2x4 gen() 10814 MB/s Apr 12 18:44:14.660373 kernel: raid6: sse2x4 xor() 6371 MB/s Apr 12 18:44:14.681367 kernel: raid6: sse2x2 gen() 11487 MB/s Apr 12 18:44:14.702376 kernel: raid6: sse2x2 xor() 7411 MB/s Apr 12 18:44:14.723373 kernel: raid6: sse2x1 gen() 10226 MB/s Apr 12 18:44:14.749427 kernel: raid6: sse2x1 xor() 5177 MB/s Apr 12 18:44:14.749510 kernel: raid6: using algorithm avx2x2 gen() 18104 MB/s Apr 12 18:44:14.749534 kernel: raid6: .... xor() 18130 MB/s, rmw enabled Apr 12 18:44:14.754632 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:44:14.781350 kernel: xor: automatically using best checksumming function avx Apr 12 18:44:14.896342 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:44:14.909383 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:44:14.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.908000 audit: BPF prog-id=7 op=LOAD Apr 12 18:44:14.908000 audit: BPF prog-id=8 op=LOAD Apr 12 18:44:14.910863 systemd[1]: Starting systemd-udevd.service... Apr 12 18:44:14.927836 systemd-udevd[388]: Using default interface naming scheme 'v252'. Apr 12 18:44:14.947682 systemd[1]: Started systemd-udevd.service. Apr 12 18:44:14.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.957735 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:44:14.973505 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Apr 12 18:44:15.013486 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:44:15.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:15.014781 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:44:15.082821 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:44:15.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:15.174326 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:44:15.263950 kernel: scsi host0: Virtio SCSI HBA Apr 12 18:44:15.271563 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:44:15.291394 kernel: AES CTR mode by8 optimization enabled Apr 12 18:44:15.300326 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Apr 12 18:44:15.370081 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Apr 12 18:44:15.370607 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Apr 12 18:44:15.370826 kernel: sd 0:0:1:0: [sda] Write Protect is off Apr 12 18:44:15.384874 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Apr 12 18:44:15.385384 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Apr 12 18:44:15.401408 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:44:15.401505 kernel: GPT:17805311 != 25165823 Apr 12 18:44:15.401529 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:44:15.407746 kernel: GPT:17805311 != 25165823 Apr 12 18:44:15.411702 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:44:15.417112 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:44:15.428332 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Apr 12 18:44:15.480329 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (442) Apr 12 18:44:15.499743 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:44:15.514129 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:44:15.522766 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:44:15.555659 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:44:15.555944 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:44:15.594566 systemd[1]: Starting disk-uuid.service... Apr 12 18:44:15.606587 disk-uuid[510]: Primary Header is updated. Apr 12 18:44:15.606587 disk-uuid[510]: Secondary Entries is updated. Apr 12 18:44:15.606587 disk-uuid[510]: Secondary Header is updated. Apr 12 18:44:15.635449 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:44:15.652386 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:44:15.680344 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:44:16.673334 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Apr 12 18:44:16.673959 disk-uuid[511]: The operation has completed successfully. Apr 12 18:44:16.747635 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:44:16.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:16.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:16.747805 systemd[1]: Finished disk-uuid.service. Apr 12 18:44:16.754383 systemd[1]: Starting verity-setup.service... Apr 12 18:44:16.784324 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Apr 12 18:44:16.871553 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:44:16.885741 systemd[1]: Finished verity-setup.service. Apr 12 18:44:16.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:16.887080 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:44:16.992314 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:44:16.992755 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:44:16.993171 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:44:17.041466 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:44:17.041508 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:44:17.041532 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:44:16.994137 systemd[1]: Starting ignition-setup.service... Apr 12 18:44:17.064803 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:44:17.006804 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:44:17.069625 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:44:17.087257 systemd[1]: Finished ignition-setup.service. Apr 12 18:44:17.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.088538 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:44:17.143801 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:44:17.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.143000 audit: BPF prog-id=9 op=LOAD Apr 12 18:44:17.146035 systemd[1]: Starting systemd-networkd.service... Apr 12 18:44:17.181432 systemd-networkd[686]: lo: Link UP Apr 12 18:44:17.181447 systemd-networkd[686]: lo: Gained carrier Apr 12 18:44:17.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.182220 systemd-networkd[686]: Enumeration completed Apr 12 18:44:17.182378 systemd[1]: Started systemd-networkd.service. Apr 12 18:44:17.182787 systemd-networkd[686]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:44:17.185091 systemd-networkd[686]: eth0: Link UP Apr 12 18:44:17.185099 systemd-networkd[686]: eth0: Gained carrier Apr 12 18:44:17.194401 systemd-networkd[686]: eth0: DHCPv4 address 10.128.0.9/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:44:17.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.197579 systemd[1]: Reached target network.target. Apr 12 18:44:17.295604 iscsid[695]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:44:17.295604 iscsid[695]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:44:17.295604 iscsid[695]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:44:17.295604 iscsid[695]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:44:17.295604 iscsid[695]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:44:17.295604 iscsid[695]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:44:17.295604 iscsid[695]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:44:17.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.213652 systemd[1]: Starting iscsiuio.service... Apr 12 18:44:17.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.393763 ignition[634]: Ignition 2.14.0 Apr 12 18:44:17.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.253653 systemd[1]: Started iscsiuio.service. Apr 12 18:44:17.393779 ignition[634]: Stage: fetch-offline Apr 12 18:44:17.269789 systemd[1]: Starting iscsid.service... Apr 12 18:44:17.393851 ignition[634]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:17.288608 systemd[1]: Started iscsid.service. Apr 12 18:44:17.393898 ignition[634]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:17.303890 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:44:17.417202 ignition[634]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:17.349821 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:44:17.417507 ignition[634]: parsed url from cmdline: "" Apr 12 18:44:17.388633 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:44:17.417515 ignition[634]: no config URL provided Apr 12 18:44:17.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.397458 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:44:17.417523 ignition[634]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:44:17.397555 systemd[1]: Reached target remote-fs.target. Apr 12 18:44:17.417535 ignition[634]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:44:17.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.423612 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:44:17.417545 ignition[634]: failed to fetch config: resource requires networking Apr 12 18:44:17.443900 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:44:17.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.417911 ignition[634]: Ignition finished successfully Apr 12 18:44:17.463867 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:44:17.491767 ignition[710]: Ignition 2.14.0 Apr 12 18:44:17.480820 systemd[1]: Starting ignition-fetch.service... Apr 12 18:44:17.491779 ignition[710]: Stage: fetch Apr 12 18:44:17.559048 unknown[710]: fetched base config from "system" Apr 12 18:44:17.491917 ignition[710]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:17.559080 unknown[710]: fetched base config from "system" Apr 12 18:44:17.491960 ignition[710]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:17.559096 unknown[710]: fetched user config from "gcp" Apr 12 18:44:17.499157 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:17.562114 systemd[1]: Finished ignition-fetch.service. Apr 12 18:44:17.501487 ignition[710]: parsed url from cmdline: "" Apr 12 18:44:17.564841 systemd[1]: Starting ignition-kargs.service... Apr 12 18:44:17.501497 ignition[710]: no config URL provided Apr 12 18:44:17.603801 systemd[1]: Finished ignition-kargs.service. Apr 12 18:44:17.501514 ignition[710]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:44:17.619840 systemd[1]: Starting ignition-disks.service... Apr 12 18:44:17.501540 ignition[710]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:44:17.642810 systemd[1]: Finished ignition-disks.service. Apr 12 18:44:17.501589 ignition[710]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Apr 12 18:44:17.652775 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:44:17.511709 ignition[710]: GET result: OK Apr 12 18:44:17.674482 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:44:17.511892 ignition[710]: parsing config with SHA512: 03b27850a00600769d5a28a5111318ed98c679cb507bd31b4c8c3153e887a74c14ba529c152dbb921997ead43843599d140dbb906c6527d0fce7be7ae85a6a0c Apr 12 18:44:17.688497 systemd[1]: Reached target local-fs.target. Apr 12 18:44:17.560447 ignition[710]: fetch: fetch complete Apr 12 18:44:17.702488 systemd[1]: Reached target sysinit.target. Apr 12 18:44:17.560454 ignition[710]: fetch: fetch passed Apr 12 18:44:17.702604 systemd[1]: Reached target basic.target. Apr 12 18:44:17.560509 ignition[710]: Ignition finished successfully Apr 12 18:44:17.721705 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:44:17.578370 ignition[716]: Ignition 2.14.0 Apr 12 18:44:17.578385 ignition[716]: Stage: kargs Apr 12 18:44:17.578520 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:17.578545 ignition[716]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:17.584748 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:17.586256 ignition[716]: kargs: kargs passed Apr 12 18:44:17.586328 ignition[716]: Ignition finished successfully Apr 12 18:44:17.631836 ignition[722]: Ignition 2.14.0 Apr 12 18:44:17.631846 ignition[722]: Stage: disks Apr 12 18:44:17.631989 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:17.632019 ignition[722]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:17.639220 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:17.640839 ignition[722]: disks: disks passed Apr 12 18:44:17.640889 ignition[722]: Ignition finished successfully Apr 12 18:44:17.764740 systemd-fsck[730]: ROOT: clean, 612/1628000 files, 124056/1617920 blocks Apr 12 18:44:17.957271 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:44:17.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:17.958571 systemd[1]: Mounting sysroot.mount... Apr 12 18:44:17.989488 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:44:17.997679 systemd[1]: Mounted sysroot.mount. Apr 12 18:44:17.998005 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:44:18.021379 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:44:18.032960 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:44:18.033010 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:44:18.033038 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:44:18.138465 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (736) Apr 12 18:44:18.138504 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:44:18.138529 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:44:18.138553 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:44:18.138575 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:44:18.048747 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:44:18.071807 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:44:18.161467 initrd-setup-root[744]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:44:18.106264 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:44:18.180463 initrd-setup-root[767]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:44:18.142501 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:44:18.198486 initrd-setup-root[775]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:44:18.208417 initrd-setup-root[783]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:44:18.219526 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:44:18.259678 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:44:18.259711 kernel: audit: type=1130 audit(1712947458.218:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:18.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:18.220976 systemd[1]: Starting ignition-mount.service... Apr 12 18:44:18.267530 systemd[1]: Starting sysroot-boot.service... Apr 12 18:44:18.281495 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:44:18.281603 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:44:18.308451 ignition[801]: INFO : Ignition 2.14.0 Apr 12 18:44:18.308451 ignition[801]: INFO : Stage: mount Apr 12 18:44:18.308451 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:18.308451 ignition[801]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:18.438495 kernel: audit: type=1130 audit(1712947458.322:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:18.438541 kernel: audit: type=1130 audit(1712947458.349:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:18.438564 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (811) Apr 12 18:44:18.438586 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:44:18.438609 kernel: BTRFS info (device sda6): using free space tree Apr 12 18:44:18.438632 kernel: BTRFS info (device sda6): has skinny extents Apr 12 18:44:18.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:18.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:18.438831 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:18.438831 ignition[801]: INFO : mount: mount passed Apr 12 18:44:18.438831 ignition[801]: INFO : Ignition finished successfully Apr 12 18:44:18.485457 kernel: BTRFS info (device sda6): enabling ssd optimizations Apr 12 18:44:18.315124 systemd[1]: Finished ignition-mount.service. Apr 12 18:44:18.325848 systemd[1]: Finished sysroot-boot.service. Apr 12 18:44:18.344493 systemd-networkd[686]: eth0: Gained IPv6LL Apr 12 18:44:18.507459 ignition[830]: INFO : Ignition 2.14.0 Apr 12 18:44:18.507459 ignition[830]: INFO : Stage: files Apr 12 18:44:18.507459 ignition[830]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:18.507459 ignition[830]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:18.507459 ignition[830]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:18.507459 ignition[830]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:44:18.507459 ignition[830]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:44:18.507459 ignition[830]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:44:18.507459 ignition[830]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:44:18.507459 ignition[830]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:44:18.507459 ignition[830]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:44:18.507459 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:44:18.507459 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:44:18.351975 systemd[1]: Starting ignition-files.service... Apr 12 18:44:18.390547 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:44:18.454606 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:44:18.503506 unknown[830]: wrote ssh authorized keys file for user: core Apr 12 18:44:18.846455 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:44:19.117363 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:44:19.141490 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:44:19.141490 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:44:19.141490 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:44:19.264695 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:44:19.376454 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:44:19.403454 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (832) Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/etc/hosts" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(6): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2966789054" Apr 12 18:44:19.403494 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(5): op(6): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2966789054": device or resource busy Apr 12 18:44:19.403494 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(5): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2966789054", trying btrfs: device or resource busy Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2966789054" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(7): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2966789054" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [started] unmounting "/mnt/oem2966789054" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): op(8): [finished] unmounting "/mnt/oem2966789054" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/etc/hosts" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:44:19.403494 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:44:19.607462 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): GET result: OK Apr 12 18:44:19.406896 systemd[1]: mnt-oem2966789054.mount: Deactivated successfully. Apr 12 18:44:19.686547 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(9): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:44:19.710467 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:44:19.710467 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:44:19.710467 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:44:19.822731 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Apr 12 18:44:22.517507 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(a): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem312076587" Apr 12 18:44:22.541498 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(b): op(c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem312076587": device or resource busy Apr 12 18:44:22.541498 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem312076587", trying btrfs: device or resource busy Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem312076587" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem312076587" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [started] unmounting "/mnt/oem312076587" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): op(e): [finished] unmounting "/mnt/oem312076587" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:44:22.541498 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:44:22.532886 systemd[1]: mnt-oem312076587.mount: Deactivated successfully. Apr 12 18:44:22.764481 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): GET result: OK Apr 12 18:44:22.794918 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(f): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 18:44:22.819493 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:44:22.819493 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:44:22.819493 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:44:22.948844 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): GET result: OK Apr 12 18:44:40.830197 ignition[830]: DEBUG : files: createFilesystemsFiles: createFiles: op(10): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(14): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(14): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(15): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(15): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:44:40.854470 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem537023245" Apr 12 18:44:41.307500 kernel: audit: type=1130 audit(1712947480.909:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.307554 kernel: audit: type=1130 audit(1712947481.016:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.307579 kernel: audit: type=1130 audit(1712947481.054:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.307612 kernel: audit: type=1131 audit(1712947481.054:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.307635 kernel: audit: type=1130 audit(1712947481.185:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.307658 kernel: audit: type=1131 audit(1712947481.185:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.307899 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(17): op(18): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem537023245": device or resource busy Apr 12 18:44:41.307899 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(17): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem537023245", trying btrfs: device or resource busy Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem537023245" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(19): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem537023245" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [started] unmounting "/mnt/oem537023245" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): op(1a): [finished] unmounting "/mnt/oem537023245" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(17): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): oem config not found in "/usr/share/oem", looking on oem partition Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem760112252" Apr 12 18:44:41.307899 ignition[830]: CRITICAL : files: createFilesystemsFiles: createFiles: op(1b): op(1c): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem760112252": device or resource busy Apr 12 18:44:41.307899 ignition[830]: ERROR : files: createFilesystemsFiles: createFiles: op(1b): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem760112252", trying btrfs: device or resource busy Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem760112252" Apr 12 18:44:41.307899 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1d): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem760112252" Apr 12 18:44:41.652534 kernel: audit: type=1130 audit(1712947481.333:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.652597 kernel: audit: type=1131 audit(1712947481.527:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.856654 systemd[1]: mnt-oem537023245.mount: Deactivated successfully. Apr 12 18:44:41.670501 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [started] unmounting "/mnt/oem760112252" Apr 12 18:44:41.670501 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): op(1e): [finished] unmounting "/mnt/oem760112252" Apr 12 18:44:41.670501 ignition[830]: INFO : files: createFilesystemsFiles: createFiles: op(1b): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(1f): [started] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(1f): [finished] processing unit "coreos-metadata-sshkeys@.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(20): [started] processing unit "oem-gce.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(20): [finished] processing unit "oem-gce.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(21): [started] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(21): [finished] processing unit "oem-gce-enable-oslogin.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(22): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(22): op(23): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(22): op(23): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(22): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(24): [started] processing unit "prepare-critools.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(24): op(25): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(24): op(25): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(24): [finished] processing unit "prepare-critools.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(26): [started] processing unit "prepare-helm.service" Apr 12 18:44:41.670501 ignition[830]: INFO : files: op(26): op(27): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:44:42.059464 kernel: audit: type=1131 audit(1712947481.868:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.059515 kernel: audit: type=1131 audit(1712947481.941:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.876803 systemd[1]: mnt-oem760112252.mount: Deactivated successfully. Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(26): op(27): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(26): [finished] processing unit "prepare-helm.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(28): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(28): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(29): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(29): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2a): [started] setting preset to enabled for "oem-gce.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2a): [finished] setting preset to enabled for "oem-gce.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2b): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2b): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2c): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2c): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2d): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: op(2d): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:44:42.068487 ignition[830]: INFO : files: createResultFile: createFiles: op(2e): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:44:42.068487 ignition[830]: INFO : files: createResultFile: createFiles: op(2e): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:44:42.068487 ignition[830]: INFO : files: files passed Apr 12 18:44:42.068487 ignition[830]: INFO : Ignition finished successfully Apr 12 18:44:42.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.388946 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:44:42.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.891794 systemd[1]: Finished ignition-files.service. Apr 12 18:44:40.921295 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:44:40.946708 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:44:40.947822 systemd[1]: Starting ignition-quench.service... Apr 12 18:44:40.990855 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:44:41.018276 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:44:41.018472 systemd[1]: Finished ignition-quench.service. Apr 12 18:44:42.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.541664 ignition[868]: INFO : Ignition 2.14.0 Apr 12 18:44:42.541664 ignition[868]: INFO : Stage: umount Apr 12 18:44:42.541664 ignition[868]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Apr 12 18:44:42.541664 ignition[868]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Apr 12 18:44:42.541664 ignition[868]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Apr 12 18:44:42.541664 ignition[868]: INFO : umount: umount passed Apr 12 18:44:42.541664 ignition[868]: INFO : Ignition finished successfully Apr 12 18:44:42.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.055938 systemd[1]: Reached target ignition-complete.target. Apr 12 18:44:42.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.660000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:44:41.141772 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:44:41.176526 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:44:41.176649 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:44:42.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.186712 systemd[1]: Reached target initrd-fs.target. Apr 12 18:44:42.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.268632 systemd[1]: Reached target initrd.target. Apr 12 18:44:42.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.285748 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:44:41.287074 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:44:42.765000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.314939 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:44:41.336133 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:44:41.411936 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:44:42.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.428742 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:44:42.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.450810 systemd[1]: Stopped target timers.target. Apr 12 18:44:42.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.487756 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:44:41.487958 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:44:41.529017 systemd[1]: Stopped target initrd.target. Apr 12 18:44:42.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.590810 systemd[1]: Stopped target basic.target. Apr 12 18:44:42.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.635799 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:44:42.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.661830 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:44:42.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.691790 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:44:42.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.729818 systemd[1]: Stopped target remote-fs.target. Apr 12 18:44:41.743099 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:44:41.760888 systemd[1]: Stopped target sysinit.target. Apr 12 18:44:41.794783 systemd[1]: Stopped target local-fs.target. Apr 12 18:44:41.807839 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:44:41.825915 systemd[1]: Stopped target swap.target. Apr 12 18:44:43.027506 systemd-journald[189]: Received SIGTERM from PID 1 (n/a). Apr 12 18:44:43.027589 iscsid[695]: iscsid shutting down. Apr 12 18:44:41.851751 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:44:41.851955 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:44:41.870009 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:44:41.931728 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:44:41.931925 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:44:41.943036 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:44:41.943342 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:44:42.013951 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:44:42.014133 systemd[1]: Stopped ignition-files.service. Apr 12 18:44:42.044330 systemd[1]: Stopping ignition-mount.service... Apr 12 18:44:42.068989 systemd[1]: Stopping iscsiuio.service... Apr 12 18:44:42.105886 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:44:42.117745 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:44:42.118025 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:44:42.136038 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:44:42.136244 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:44:42.167503 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:44:42.168408 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:44:42.168522 systemd[1]: Stopped iscsiuio.service. Apr 12 18:44:42.185241 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:44:42.185380 systemd[1]: Stopped ignition-mount.service. Apr 12 18:44:42.198118 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:44:42.198243 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:44:42.237237 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:44:42.237456 systemd[1]: Stopped ignition-disks.service. Apr 12 18:44:42.250751 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:44:42.250824 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:44:42.301879 systemd[1]: ignition-fetch.service: Deactivated successfully. Apr 12 18:44:42.301948 systemd[1]: Stopped ignition-fetch.service. Apr 12 18:44:42.340713 systemd[1]: Stopped target network.target. Apr 12 18:44:42.380500 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:44:42.380726 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:44:42.405705 systemd[1]: Stopped target paths.target. Apr 12 18:44:42.429503 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:44:42.434700 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:44:42.446601 systemd[1]: Stopped target slices.target. Apr 12 18:44:42.463535 systemd[1]: Stopped target sockets.target. Apr 12 18:44:42.488640 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:44:42.488683 systemd[1]: Closed iscsid.socket. Apr 12 18:44:42.502638 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:44:42.502703 systemd[1]: Closed iscsiuio.socket. Apr 12 18:44:42.517652 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:44:42.517732 systemd[1]: Stopped ignition-setup.service. Apr 12 18:44:42.533760 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:44:42.533835 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:44:42.549882 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:44:42.553390 systemd-networkd[686]: eth0: DHCPv6 lease lost Apr 12 18:44:42.556753 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:44:42.570451 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:44:42.570575 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:44:42.587362 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:44:42.587491 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:44:42.635430 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:44:42.635542 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:44:42.654167 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:44:42.654218 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:44:42.670552 systemd[1]: Stopping network-cleanup.service... Apr 12 18:44:42.684558 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:44:42.684651 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:44:42.700683 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:44:42.700749 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:44:42.718794 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:44:42.718863 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:44:42.733848 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:44:42.749210 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:44:42.749958 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:44:42.750130 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:44:42.768132 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:44:42.768221 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:44:42.782520 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:44:42.782580 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:44:42.797573 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:44:42.797640 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:44:42.812734 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:44:42.812806 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:44:42.828774 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:44:42.828857 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:44:42.846809 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:44:42.870444 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:44:42.870671 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:44:42.885760 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:44:42.885821 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:44:42.901669 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:44:42.901738 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:44:42.918955 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 18:44:42.919768 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:44:42.919889 systemd[1]: Stopped network-cleanup.service. Apr 12 18:44:42.935020 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:44:42.935134 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:44:42.951903 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:44:42.968646 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:44:42.989431 systemd[1]: Switching root. Apr 12 18:44:43.038734 systemd-journald[189]: Journal stopped Apr 12 18:44:47.824135 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:44:47.824259 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:44:47.824290 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:44:47.824331 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:44:47.824352 kernel: SELinux: policy capability open_perms=1 Apr 12 18:44:47.824373 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:44:47.824414 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:44:47.824436 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:44:47.824458 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:44:47.824480 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:44:47.824507 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:44:47.824531 systemd[1]: Successfully loaded SELinux policy in 114.272ms. Apr 12 18:44:47.824575 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.832ms. Apr 12 18:44:47.824601 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:44:47.824627 systemd[1]: Detected virtualization kvm. Apr 12 18:44:47.824650 systemd[1]: Detected architecture x86-64. Apr 12 18:44:47.824674 systemd[1]: Detected first boot. Apr 12 18:44:47.824696 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:44:47.824732 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:44:47.824841 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:44:47.824870 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:44:47.824915 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:44:47.824941 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:44:47.825032 kernel: kauditd_printk_skb: 48 callbacks suppressed Apr 12 18:44:47.825056 kernel: audit: type=1334 audit(1712947486.900:88): prog-id=12 op=LOAD Apr 12 18:44:47.825095 kernel: audit: type=1334 audit(1712947486.900:89): prog-id=3 op=UNLOAD Apr 12 18:44:47.825116 kernel: audit: type=1334 audit(1712947486.906:90): prog-id=13 op=LOAD Apr 12 18:44:47.825156 kernel: audit: type=1334 audit(1712947486.913:91): prog-id=14 op=LOAD Apr 12 18:44:47.825186 kernel: audit: type=1334 audit(1712947486.913:92): prog-id=4 op=UNLOAD Apr 12 18:44:47.825220 kernel: audit: type=1334 audit(1712947486.913:93): prog-id=5 op=UNLOAD Apr 12 18:44:47.825243 kernel: audit: type=1334 audit(1712947486.920:94): prog-id=15 op=LOAD Apr 12 18:44:47.825268 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:44:47.825294 kernel: audit: type=1334 audit(1712947486.920:95): prog-id=12 op=UNLOAD Apr 12 18:44:47.825342 kernel: audit: type=1334 audit(1712947486.927:96): prog-id=16 op=LOAD Apr 12 18:44:47.825370 kernel: audit: type=1334 audit(1712947486.934:97): prog-id=17 op=LOAD Apr 12 18:44:47.825394 systemd[1]: Stopped iscsid.service. Apr 12 18:44:47.825418 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:44:47.825438 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:44:47.825462 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:44:47.825494 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:44:47.825519 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:44:47.825547 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Apr 12 18:44:47.825570 systemd[1]: Created slice system-getty.slice. Apr 12 18:44:47.825594 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:44:47.825619 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:44:47.825642 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:44:47.825666 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:44:47.825688 systemd[1]: Created slice user.slice. Apr 12 18:44:47.825715 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:44:47.825739 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:44:47.825767 systemd[1]: Set up automount boot.automount. Apr 12 18:44:47.825791 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:44:47.825816 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:44:47.825839 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:44:47.825864 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:44:47.825889 systemd[1]: Reached target integritysetup.target. Apr 12 18:44:47.825912 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:44:47.825935 systemd[1]: Reached target remote-fs.target. Apr 12 18:44:47.825958 systemd[1]: Reached target slices.target. Apr 12 18:44:47.825983 systemd[1]: Reached target swap.target. Apr 12 18:44:47.826013 systemd[1]: Reached target torcx.target. Apr 12 18:44:47.826035 systemd[1]: Reached target veritysetup.target. Apr 12 18:44:47.826059 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:44:47.826095 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:44:47.826119 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:44:47.826142 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:44:47.826165 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:44:47.826188 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:44:47.826212 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:44:47.826745 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:44:47.826789 systemd[1]: Mounting media.mount... Apr 12 18:44:47.826814 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:44:47.826838 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:44:47.826860 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:44:47.826882 systemd[1]: Mounting tmp.mount... Apr 12 18:44:47.826905 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:44:47.826928 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:44:47.826951 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:44:47.826980 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:44:47.827003 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:44:47.827026 systemd[1]: Starting modprobe@drm.service... Apr 12 18:44:47.827050 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:44:47.827083 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:44:47.827107 systemd[1]: Starting modprobe@loop.service... Apr 12 18:44:47.827133 kernel: fuse: init (API version 7.34) Apr 12 18:44:47.827157 kernel: loop: module loaded Apr 12 18:44:47.827182 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:44:47.827210 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:44:47.827313 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:44:47.827350 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:44:47.827372 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:44:47.827394 systemd[1]: Stopped systemd-journald.service. Apr 12 18:44:47.827421 systemd[1]: Starting systemd-journald.service... Apr 12 18:44:47.827445 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:44:47.827468 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:44:47.827496 systemd-journald[992]: Journal started Apr 12 18:44:47.827585 systemd-journald[992]: Runtime Journal (/run/log/journal/4d7aa8f9386ed82f9cbc025ba06003e9) is 8.0M, max 148.8M, 140.8M free. Apr 12 18:44:43.038000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:44:43.370000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:44:43.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:44:43.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:44:43.522000 audit: BPF prog-id=10 op=LOAD Apr 12 18:44:43.522000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:44:43.522000 audit: BPF prog-id=11 op=LOAD Apr 12 18:44:43.522000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:44:43.710000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:44:43.710000 audit[901]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:43.710000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:44:43.721000 audit[901]: AVC avc: denied { associate } for pid=901 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:44:43.721000 audit[901]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155989 a2=1ed a3=0 items=2 ppid=884 pid=901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:43.721000 audit: CWD cwd="/" Apr 12 18:44:43.721000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:43.721000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:43.721000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:44:46.900000 audit: BPF prog-id=12 op=LOAD Apr 12 18:44:46.900000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:44:46.906000 audit: BPF prog-id=13 op=LOAD Apr 12 18:44:46.913000 audit: BPF prog-id=14 op=LOAD Apr 12 18:44:46.913000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:44:46.913000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:44:46.920000 audit: BPF prog-id=15 op=LOAD Apr 12 18:44:46.920000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:44:46.927000 audit: BPF prog-id=16 op=LOAD Apr 12 18:44:46.934000 audit: BPF prog-id=17 op=LOAD Apr 12 18:44:46.935000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:44:46.935000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:44:46.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:46.989000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:44:46.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.776000 audit: BPF prog-id=18 op=LOAD Apr 12 18:44:47.837111 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:44:47.776000 audit: BPF prog-id=19 op=LOAD Apr 12 18:44:47.776000 audit: BPF prog-id=20 op=LOAD Apr 12 18:44:47.776000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:44:47.776000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:44:47.820000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:44:47.820000 audit[992]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffde7ec9610 a2=4000 a3=7ffde7ec96ac items=0 ppid=1 pid=992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:47.820000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:44:43.704940 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:44:46.900221 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:44:43.706410 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:44:46.938535 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:44:43.706577 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:44:43.706773 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:44:43.706791 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:44:43.706840 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:44:43.706858 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:44:43.707099 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:44:43.707173 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:44:43.707194 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:44:43.710045 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:44:43.710109 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:44:43.710647 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:44:43.710675 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:44:43.710713 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:44:43.710741 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:43Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:44:46.269320 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:46Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:44:46.269655 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:46Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:44:46.269794 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:46Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:44:46.270022 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:46Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:44:46.270094 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:46Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:44:46.270168 /usr/lib/systemd/system-generators/torcx-generator[901]: time="2024-04-12T18:44:46Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:44:47.855365 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:44:47.877215 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:44:47.877348 systemd[1]: Stopped verity-setup.service. Apr 12 18:44:47.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.897326 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:44:47.908360 systemd[1]: Started systemd-journald.service. Apr 12 18:44:47.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.918035 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:44:47.925718 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:44:47.933723 systemd[1]: Mounted media.mount. Apr 12 18:44:47.941583 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:44:47.950694 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:44:47.959692 systemd[1]: Mounted tmp.mount. Apr 12 18:44:47.967810 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:44:47.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.976819 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:44:47.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.985799 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:44:47.986013 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:44:47.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.994860 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:44:47.995070 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:44:48.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.003926 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:44:48.004148 systemd[1]: Finished modprobe@drm.service. Apr 12 18:44:48.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.014125 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:44:48.014397 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:44:48.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.025095 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:44:48.025416 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:44:48.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.034999 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:44:48.035223 systemd[1]: Finished modprobe@loop.service. Apr 12 18:44:48.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.043959 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:44:48.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.052914 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:44:48.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.061890 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:44:48.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.070863 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:44:48.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.080140 systemd[1]: Reached target network-pre.target. Apr 12 18:44:48.090148 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:44:48.099837 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:44:48.106490 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:44:48.109602 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:44:48.119618 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:44:48.127494 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:44:48.129293 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:44:48.136506 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:44:48.139117 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:44:48.139690 systemd-journald[992]: Time spent on flushing to /var/log/journal/4d7aa8f9386ed82f9cbc025ba06003e9 is 75.991ms for 1193 entries. Apr 12 18:44:48.139690 systemd-journald[992]: System Journal (/var/log/journal/4d7aa8f9386ed82f9cbc025ba06003e9) is 8.0M, max 584.8M, 576.8M free. Apr 12 18:44:48.269319 systemd-journald[992]: Received client request to flush runtime journal. Apr 12 18:44:48.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.156473 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:44:48.166127 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:44:48.177050 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:44:48.270741 udevadm[1006]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:44:48.185610 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:44:48.194784 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:44:48.203920 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:44:48.216238 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:44:48.226634 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:44:48.237479 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:44:48.270867 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:44:48.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.327459 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:44:48.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.850442 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:44:48.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.857000 audit: BPF prog-id=21 op=LOAD Apr 12 18:44:48.858000 audit: BPF prog-id=22 op=LOAD Apr 12 18:44:48.858000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:44:48.858000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:44:48.860358 systemd[1]: Starting systemd-udevd.service... Apr 12 18:44:48.882579 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Apr 12 18:44:48.931676 systemd[1]: Started systemd-udevd.service. Apr 12 18:44:48.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:48.941000 audit: BPF prog-id=23 op=LOAD Apr 12 18:44:48.944119 systemd[1]: Starting systemd-networkd.service... Apr 12 18:44:48.956000 audit: BPF prog-id=24 op=LOAD Apr 12 18:44:48.956000 audit: BPF prog-id=25 op=LOAD Apr 12 18:44:48.957000 audit: BPF prog-id=26 op=LOAD Apr 12 18:44:48.959399 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:44:49.012784 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:44:49.018166 systemd[1]: Started systemd-userdbd.service. Apr 12 18:44:49.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.142404 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:44:49.152482 systemd-networkd[1025]: lo: Link UP Apr 12 18:44:49.152496 systemd-networkd[1025]: lo: Gained carrier Apr 12 18:44:49.153204 systemd-networkd[1025]: Enumeration completed Apr 12 18:44:49.153376 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:44:49.153394 systemd[1]: Started systemd-networkd.service. Apr 12 18:44:49.155871 systemd-networkd[1025]: eth0: Link UP Apr 12 18:44:49.156052 systemd-networkd[1025]: eth0: Gained carrier Apr 12 18:44:49.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.187509 systemd-networkd[1025]: eth0: DHCPv4 address 10.128.0.9/32, gateway 10.128.0.1 acquired from 169.254.169.254 Apr 12 18:44:49.200360 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:44:49.211000 audit[1026]: AVC avc: denied { confidentiality } for pid=1026 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:44:49.225346 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Apr 12 18:44:49.211000 audit[1026]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5623e29927f0 a1=32194 a2=7fb82566ebc5 a3=5 items=108 ppid=1011 pid=1026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:49.211000 audit: CWD cwd="/" Apr 12 18:44:49.211000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=1 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=2 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=3 name=(null) inode=13864 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=4 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=5 name=(null) inode=13865 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=6 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=7 name=(null) inode=13866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=8 name=(null) inode=13866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=9 name=(null) inode=13867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=10 name=(null) inode=13866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=11 name=(null) inode=13868 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=12 name=(null) inode=13866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=13 name=(null) inode=13869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=14 name=(null) inode=13866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=15 name=(null) inode=13870 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=16 name=(null) inode=13866 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=17 name=(null) inode=13871 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=18 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=19 name=(null) inode=13872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=20 name=(null) inode=13872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=21 name=(null) inode=13873 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=22 name=(null) inode=13872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=23 name=(null) inode=13874 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=24 name=(null) inode=13872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=25 name=(null) inode=13875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=26 name=(null) inode=13872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=27 name=(null) inode=13876 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=28 name=(null) inode=13872 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=29 name=(null) inode=13877 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=30 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=31 name=(null) inode=13878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=32 name=(null) inode=13878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=33 name=(null) inode=13879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=34 name=(null) inode=13878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=35 name=(null) inode=13880 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=36 name=(null) inode=13878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=37 name=(null) inode=13881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=38 name=(null) inode=13878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=39 name=(null) inode=13882 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=40 name=(null) inode=13878 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=41 name=(null) inode=13883 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=42 name=(null) inode=13863 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=43 name=(null) inode=13884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=44 name=(null) inode=13884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=45 name=(null) inode=13885 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=46 name=(null) inode=13884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=47 name=(null) inode=13886 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=48 name=(null) inode=13884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=49 name=(null) inode=13887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=50 name=(null) inode=13884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=51 name=(null) inode=13888 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=52 name=(null) inode=13884 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=53 name=(null) inode=13889 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=55 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=56 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=57 name=(null) inode=13891 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=58 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=59 name=(null) inode=13892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=60 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=61 name=(null) inode=13893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=62 name=(null) inode=13893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=63 name=(null) inode=13894 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=64 name=(null) inode=13893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=65 name=(null) inode=13895 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=66 name=(null) inode=13893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=67 name=(null) inode=13896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.248329 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1022) Apr 12 18:44:49.211000 audit: PATH item=68 name=(null) inode=13893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=69 name=(null) inode=13897 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=70 name=(null) inode=13893 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=71 name=(null) inode=13898 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=72 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=73 name=(null) inode=13899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=74 name=(null) inode=13899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=75 name=(null) inode=13900 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=76 name=(null) inode=13899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=77 name=(null) inode=13901 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=78 name=(null) inode=13899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=79 name=(null) inode=13902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=80 name=(null) inode=13899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=81 name=(null) inode=13903 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=82 name=(null) inode=13899 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=83 name=(null) inode=13904 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=84 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=85 name=(null) inode=13905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=86 name=(null) inode=13905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=87 name=(null) inode=13906 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=88 name=(null) inode=13905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=89 name=(null) inode=13907 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=90 name=(null) inode=13905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=91 name=(null) inode=13908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=92 name=(null) inode=13905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=93 name=(null) inode=13909 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=94 name=(null) inode=13905 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=95 name=(null) inode=13910 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=96 name=(null) inode=13890 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=97 name=(null) inode=13911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=98 name=(null) inode=13911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=99 name=(null) inode=13912 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=100 name=(null) inode=13911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=101 name=(null) inode=13913 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=102 name=(null) inode=13911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=103 name=(null) inode=13914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=104 name=(null) inode=13911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=105 name=(null) inode=13915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=106 name=(null) inode=13911 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PATH item=107 name=(null) inode=13916 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:49.211000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:44:49.282329 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Apr 12 18:44:49.288343 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:44:49.304371 kernel: ACPI: button: Sleep Button [SLPF] Apr 12 18:44:49.319337 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Apr 12 18:44:49.331326 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:44:49.351712 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:44:49.360877 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:44:49.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.371053 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:44:49.400268 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:44:49.429812 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:44:49.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.438638 systemd[1]: Reached target cryptsetup.target. Apr 12 18:44:49.448901 systemd[1]: Starting lvm2-activation.service... Apr 12 18:44:49.455102 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:44:49.484670 systemd[1]: Finished lvm2-activation.service. Apr 12 18:44:49.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.493678 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:44:49.502484 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:44:49.502622 systemd[1]: Reached target local-fs.target. Apr 12 18:44:49.511460 systemd[1]: Reached target machines.target. Apr 12 18:44:49.521039 systemd[1]: Starting ldconfig.service... Apr 12 18:44:49.529558 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:44:49.529670 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:44:49.531520 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:44:49.540112 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:44:49.552538 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:44:49.552885 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:44:49.553002 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:44:49.555008 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:44:49.555784 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1051 (bootctl) Apr 12 18:44:49.557827 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:44:49.588102 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:44:49.589470 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:44:49.592665 systemd-tmpfiles[1055]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:44:49.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.596668 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:44:49.733999 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) Apr 12 18:44:49.733999 systemd-fsck[1060]: /dev/sda1: 789 files, 119240/258078 clusters Apr 12 18:44:49.731445 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:44:49.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.743280 systemd[1]: Mounting boot.mount... Apr 12 18:44:49.753203 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:44:49.754167 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:44:49.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.764406 systemd[1]: Mounted boot.mount. Apr 12 18:44:49.790711 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:44:49.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.895030 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:44:49.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.906703 systemd[1]: Starting audit-rules.service... Apr 12 18:44:49.916081 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:44:49.926319 systemd[1]: Starting oem-gce-enable-oslogin.service... Apr 12 18:44:49.936480 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:44:49.945000 audit: BPF prog-id=27 op=LOAD Apr 12 18:44:49.948653 systemd[1]: Starting systemd-resolved.service... Apr 12 18:44:49.955000 audit: BPF prog-id=28 op=LOAD Apr 12 18:44:49.958369 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:44:49.967470 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:44:49.975460 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:44:49.975000 audit[1085]: SYSTEM_BOOT pid=1085 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.985238 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Apr 12 18:44:49.985505 systemd[1]: Finished oem-gce-enable-oslogin.service. Apr 12 18:44:49.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.997595 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:44:50.001027 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:44:50.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:50.029810 augenrules[1093]: No rules Apr 12 18:44:50.028000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:44:50.028000 audit[1093]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffdbe8ec80 a2=420 a3=0 items=0 ppid=1063 pid=1093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:50.028000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:44:50.033331 systemd[1]: Finished audit-rules.service. Apr 12 18:44:50.042395 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:44:50.123849 systemd-resolved[1077]: Positive Trust Anchors: Apr 12 18:44:50.123874 systemd-resolved[1077]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:44:50.123926 systemd-resolved[1077]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:44:50.144185 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:44:50.146201 systemd-timesyncd[1080]: Contacted time server 169.254.169.254:123 (169.254.169.254). Apr 12 18:44:50.146434 systemd-timesyncd[1080]: Initial clock synchronization to Fri 2024-04-12 18:44:50.162310 UTC. Apr 12 18:44:50.152795 systemd[1]: Reached target time-set.target. Apr 12 18:44:50.167482 systemd-resolved[1077]: Defaulting to hostname 'linux'. Apr 12 18:44:50.170333 systemd[1]: Started systemd-resolved.service. Apr 12 18:44:50.178486 systemd[1]: Reached target network.target. Apr 12 18:44:50.186400 systemd[1]: Reached target nss-lookup.target. Apr 12 18:44:50.189415 ldconfig[1050]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:44:50.196359 systemd[1]: Finished ldconfig.service. Apr 12 18:44:50.205151 systemd[1]: Starting systemd-update-done.service... Apr 12 18:44:50.215168 systemd[1]: Finished systemd-update-done.service. Apr 12 18:44:50.223626 systemd[1]: Reached target sysinit.target. Apr 12 18:44:50.232677 systemd[1]: Started motdgen.path. Apr 12 18:44:50.239621 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:44:50.252754 systemd[1]: Started logrotate.timer. Apr 12 18:44:50.259641 systemd[1]: Started mdadm.timer. Apr 12 18:44:50.266433 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:44:50.274430 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:44:50.274492 systemd[1]: Reached target paths.target. Apr 12 18:44:50.281408 systemd[1]: Reached target timers.target. Apr 12 18:44:50.288790 systemd[1]: Listening on dbus.socket. Apr 12 18:44:50.296765 systemd[1]: Starting docker.socket... Apr 12 18:44:50.307736 systemd[1]: Listening on sshd.socket. Apr 12 18:44:50.314639 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:44:50.315476 systemd[1]: Listening on docker.socket. Apr 12 18:44:50.322700 systemd[1]: Reached target sockets.target. Apr 12 18:44:50.331507 systemd[1]: Reached target basic.target. Apr 12 18:44:50.338571 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:44:50.338633 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:44:50.340309 systemd[1]: Starting containerd.service... Apr 12 18:44:50.348984 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Apr 12 18:44:50.359246 systemd[1]: Starting dbus.service... Apr 12 18:44:50.366192 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:44:50.376196 systemd[1]: Starting extend-filesystems.service... Apr 12 18:44:50.383454 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:44:50.386080 jq[1105]: false Apr 12 18:44:50.385214 systemd[1]: Starting motdgen.service... Apr 12 18:44:50.396106 systemd[1]: Starting oem-gce.service... Apr 12 18:44:50.407458 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:44:50.424396 extend-filesystems[1106]: Found sda Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda1 Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda2 Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda3 Apr 12 18:44:50.472626 extend-filesystems[1106]: Found usr Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda4 Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda6 Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda7 Apr 12 18:44:50.472626 extend-filesystems[1106]: Found sda9 Apr 12 18:44:50.472626 extend-filesystems[1106]: Checking size of /dev/sda9 Apr 12 18:44:50.472626 extend-filesystems[1106]: Resized partition /dev/sda9 Apr 12 18:44:50.652674 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Apr 12 18:44:50.652843 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Apr 12 18:44:50.426395 systemd[1]: Starting prepare-critools.service... Apr 12 18:44:50.646394 dbus-daemon[1104]: [system] SELinux support is enabled Apr 12 18:44:50.653669 extend-filesystems[1130]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:44:50.653669 extend-filesystems[1130]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Apr 12 18:44:50.653669 extend-filesystems[1130]: old_desc_blocks = 1, new_desc_blocks = 2 Apr 12 18:44:50.653669 extend-filesystems[1130]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Apr 12 18:44:50.436345 systemd[1]: Starting prepare-helm.service... Apr 12 18:44:50.721031 extend-filesystems[1106]: Resized filesystem in /dev/sda9 Apr 12 18:44:50.656256 dbus-daemon[1104]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1025 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Apr 12 18:44:50.445123 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:44:50.709546 dbus-daemon[1104]: [system] Successfully activated service 'org.freedesktop.systemd1' Apr 12 18:44:50.454401 systemd[1]: Starting sshd-keygen.service... Apr 12 18:44:50.467683 systemd[1]: Starting systemd-logind.service... Apr 12 18:44:50.486630 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:44:50.486737 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Apr 12 18:44:50.722790 update_engine[1135]: I0412 18:44:50.705757 1135 main.cc:92] Flatcar Update Engine starting Apr 12 18:44:50.722790 update_engine[1135]: I0412 18:44:50.722151 1135 update_check_scheduler.cc:74] Next update check in 10m40s Apr 12 18:44:50.487592 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:44:50.723386 jq[1136]: true Apr 12 18:44:50.488950 systemd[1]: Starting update-engine.service... Apr 12 18:44:50.499802 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:44:50.513216 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:44:50.513526 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:44:50.514147 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:44:50.729010 tar[1139]: ./ Apr 12 18:44:50.729010 tar[1139]: ./loopback Apr 12 18:44:50.514417 systemd[1]: Finished motdgen.service. Apr 12 18:44:50.534607 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:44:50.729895 mkfs.ext4[1144]: mke2fs 1.46.5 (30-Dec-2021) Apr 12 18:44:50.729895 mkfs.ext4[1144]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Apr 12 18:44:50.729895 mkfs.ext4[1144]: Creating filesystem with 262144 4k blocks and 65536 inodes Apr 12 18:44:50.729895 mkfs.ext4[1144]: Filesystem UUID: d2574960-1586-4b30-9ea4-388cfef7b3ff Apr 12 18:44:50.729895 mkfs.ext4[1144]: Superblock backups stored on blocks: Apr 12 18:44:50.729895 mkfs.ext4[1144]: 32768, 98304, 163840, 229376 Apr 12 18:44:50.729895 mkfs.ext4[1144]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:44:50.729895 mkfs.ext4[1144]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:44:50.729895 mkfs.ext4[1144]: Creating journal (8192 blocks): done Apr 12 18:44:50.729895 mkfs.ext4[1144]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Apr 12 18:44:50.534885 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:44:50.730780 jq[1142]: true Apr 12 18:44:50.618899 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:44:50.619181 systemd[1]: Finished extend-filesystems.service. Apr 12 18:44:50.646671 systemd[1]: Started dbus.service. Apr 12 18:44:50.664540 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:44:50.664676 systemd[1]: Reached target system-config.target. Apr 12 18:44:50.673329 systemd-logind[1132]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:44:50.673365 systemd-logind[1132]: Watching system buttons on /dev/input/event2 (Sleep Button) Apr 12 18:44:50.673399 systemd-logind[1132]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:44:50.675542 systemd-logind[1132]: New seat seat0. Apr 12 18:44:50.677943 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:44:50.677980 systemd[1]: Reached target user-config.target. Apr 12 18:44:50.709833 systemd[1]: Started systemd-logind.service. Apr 12 18:44:50.751571 umount[1161]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Apr 12 18:44:50.754106 systemd[1]: Started update-engine.service. Apr 12 18:44:50.767518 systemd[1]: Started locksmithd.service. Apr 12 18:44:50.771327 bash[1171]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:44:50.777813 systemd[1]: Starting systemd-hostnamed.service... Apr 12 18:44:50.787354 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:44:50.808673 tar[1140]: crictl Apr 12 18:44:50.813751 tar[1141]: linux-amd64/helm Apr 12 18:44:50.827351 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 18:44:50.854328 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:44:50.916494 systemd-networkd[1025]: eth0: Gained IPv6LL Apr 12 18:44:50.919050 env[1143]: time="2024-04-12T18:44:50.918985018Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:44:50.960943 tar[1139]: ./bandwidth Apr 12 18:44:51.179954 coreos-metadata[1103]: Apr 12 18:44:51.179 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Apr 12 18:44:51.195290 coreos-metadata[1103]: Apr 12 18:44:51.195 INFO Fetch failed with 404: resource not found Apr 12 18:44:51.195582 coreos-metadata[1103]: Apr 12 18:44:51.195 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Apr 12 18:44:51.196120 env[1143]: time="2024-04-12T18:44:51.196072199Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:44:51.196287 env[1143]: time="2024-04-12T18:44:51.196254937Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:44:51.198094 coreos-metadata[1103]: Apr 12 18:44:51.197 INFO Fetch successful Apr 12 18:44:51.198296 coreos-metadata[1103]: Apr 12 18:44:51.198 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Apr 12 18:44:51.199966 coreos-metadata[1103]: Apr 12 18:44:51.199 INFO Fetch failed with 404: resource not found Apr 12 18:44:51.200200 coreos-metadata[1103]: Apr 12 18:44:51.200 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Apr 12 18:44:51.201647 coreos-metadata[1103]: Apr 12 18:44:51.201 INFO Fetch failed with 404: resource not found Apr 12 18:44:51.201844 coreos-metadata[1103]: Apr 12 18:44:51.201 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Apr 12 18:44:51.207522 env[1143]: time="2024-04-12T18:44:51.207469651Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:44:51.207670 env[1143]: time="2024-04-12T18:44:51.207644570Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:44:51.208105 env[1143]: time="2024-04-12T18:44:51.208059389Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:44:51.208708 coreos-metadata[1103]: Apr 12 18:44:51.208 INFO Fetch successful Apr 12 18:44:51.208842 env[1143]: time="2024-04-12T18:44:51.208814072Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:44:51.208975 env[1143]: time="2024-04-12T18:44:51.208949520Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:44:51.209065 env[1143]: time="2024-04-12T18:44:51.209047647Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:44:51.209273 env[1143]: time="2024-04-12T18:44:51.209251860Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:44:51.209732 env[1143]: time="2024-04-12T18:44:51.209704587Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:44:51.210121 env[1143]: time="2024-04-12T18:44:51.210090137Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:44:51.210256 env[1143]: time="2024-04-12T18:44:51.210225376Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:44:51.210444 env[1143]: time="2024-04-12T18:44:51.210418413Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:44:51.210596 env[1143]: time="2024-04-12T18:44:51.210575802Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:44:51.218961 unknown[1103]: wrote ssh authorized keys file for user: core Apr 12 18:44:51.233131 env[1143]: time="2024-04-12T18:44:51.233076722Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:44:51.233489 env[1143]: time="2024-04-12T18:44:51.233458141Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:44:51.233773 env[1143]: time="2024-04-12T18:44:51.233746325Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:44:51.234082 env[1143]: time="2024-04-12T18:44:51.233946377Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.234473 env[1143]: time="2024-04-12T18:44:51.234282345Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.234694 env[1143]: time="2024-04-12T18:44:51.234668927Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.234840 env[1143]: time="2024-04-12T18:44:51.234819336Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.234969 env[1143]: time="2024-04-12T18:44:51.234948907Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.235097 env[1143]: time="2024-04-12T18:44:51.235079525Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.235282 env[1143]: time="2024-04-12T18:44:51.235259565Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.235441 env[1143]: time="2024-04-12T18:44:51.235419540Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.235571 env[1143]: time="2024-04-12T18:44:51.235551136Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:44:51.235887 env[1143]: time="2024-04-12T18:44:51.235863759Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:44:51.236212 env[1143]: time="2024-04-12T18:44:51.236187173Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:44:51.236927 env[1143]: time="2024-04-12T18:44:51.236883918Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:44:51.237206 env[1143]: time="2024-04-12T18:44:51.237179861Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.237390 env[1143]: time="2024-04-12T18:44:51.237356377Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:44:51.237632 env[1143]: time="2024-04-12T18:44:51.237609162Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.252449 env[1143]: time="2024-04-12T18:44:51.252381080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.252671 env[1143]: time="2024-04-12T18:44:51.252648709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.252817 env[1143]: time="2024-04-12T18:44:51.252790719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.252961 env[1143]: time="2024-04-12T18:44:51.252940376Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.253091 env[1143]: time="2024-04-12T18:44:51.253070947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.253218 env[1143]: time="2024-04-12T18:44:51.253198333Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.253535 env[1143]: time="2024-04-12T18:44:51.253473353Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.253796 env[1143]: time="2024-04-12T18:44:51.253745118Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:44:51.254198 env[1143]: time="2024-04-12T18:44:51.254170186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.254466 env[1143]: time="2024-04-12T18:44:51.254435033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.254614 env[1143]: time="2024-04-12T18:44:51.254592720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.254743 env[1143]: time="2024-04-12T18:44:51.254722209Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:44:51.254884 env[1143]: time="2024-04-12T18:44:51.254857334Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:44:51.255012 env[1143]: time="2024-04-12T18:44:51.254991844Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:44:51.255150 env[1143]: time="2024-04-12T18:44:51.255128639Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:44:51.255352 env[1143]: time="2024-04-12T18:44:51.255325708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:44:51.256694 env[1143]: time="2024-04-12T18:44:51.255838572Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:44:51.256694 env[1143]: time="2024-04-12T18:44:51.255951439Z" level=info msg="Connect containerd service" Apr 12 18:44:51.256694 env[1143]: time="2024-04-12T18:44:51.256021299Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:44:51.266956 env[1143]: time="2024-04-12T18:44:51.266889920Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:44:51.269845 update-ssh-keys[1184]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:44:51.271087 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Apr 12 18:44:51.271777 env[1143]: time="2024-04-12T18:44:51.271713409Z" level=info msg="Start subscribing containerd event" Apr 12 18:44:51.271964 env[1143]: time="2024-04-12T18:44:51.271943307Z" level=info msg="Start recovering state" Apr 12 18:44:51.272171 env[1143]: time="2024-04-12T18:44:51.272152721Z" level=info msg="Start event monitor" Apr 12 18:44:51.272388 env[1143]: time="2024-04-12T18:44:51.272366624Z" level=info msg="Start snapshots syncer" Apr 12 18:44:51.274285 env[1143]: time="2024-04-12T18:44:51.274231416Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:44:51.274575 env[1143]: time="2024-04-12T18:44:51.274551648Z" level=info msg="Start streaming server" Apr 12 18:44:51.276051 env[1143]: time="2024-04-12T18:44:51.276022717Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:44:51.278646 env[1143]: time="2024-04-12T18:44:51.278604587Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:44:51.329405 systemd[1]: Started containerd.service. Apr 12 18:44:51.340431 env[1143]: time="2024-04-12T18:44:51.340380959Z" level=info msg="containerd successfully booted in 0.452725s" Apr 12 18:44:51.372768 dbus-daemon[1104]: [system] Successfully activated service 'org.freedesktop.hostname1' Apr 12 18:44:51.373026 systemd[1]: Started systemd-hostnamed.service. Apr 12 18:44:51.374049 dbus-daemon[1104]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1175 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Apr 12 18:44:51.386531 systemd[1]: Starting polkit.service... Apr 12 18:44:51.408071 tar[1139]: ./ptp Apr 12 18:44:51.474325 tar[1139]: ./vlan Apr 12 18:44:51.519271 polkitd[1186]: Started polkitd version 121 Apr 12 18:44:51.542825 tar[1139]: ./host-device Apr 12 18:44:51.563562 polkitd[1186]: Loading rules from directory /etc/polkit-1/rules.d Apr 12 18:44:51.563674 polkitd[1186]: Loading rules from directory /usr/share/polkit-1/rules.d Apr 12 18:44:51.585354 polkitd[1186]: Finished loading, compiling and executing 2 rules Apr 12 18:44:51.586024 dbus-daemon[1104]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Apr 12 18:44:51.586261 systemd[1]: Started polkit.service. Apr 12 18:44:51.587140 polkitd[1186]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Apr 12 18:44:51.615966 tar[1139]: ./tuning Apr 12 18:44:51.624646 systemd-hostnamed[1175]: Hostname set to (transient) Apr 12 18:44:51.627876 systemd-resolved[1077]: System hostname changed to 'ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal'. Apr 12 18:44:51.674256 tar[1139]: ./vrf Apr 12 18:44:51.732456 tar[1139]: ./sbr Apr 12 18:44:51.827506 tar[1139]: ./tap Apr 12 18:44:51.949982 tar[1139]: ./dhcp Apr 12 18:44:52.261018 systemd[1]: Finished prepare-critools.service. Apr 12 18:44:52.356223 tar[1139]: ./static Apr 12 18:44:52.449407 tar[1139]: ./firewall Apr 12 18:44:52.577376 tar[1139]: ./macvlan Apr 12 18:44:52.700690 tar[1139]: ./dummy Apr 12 18:44:52.818769 tar[1139]: ./bridge Apr 12 18:44:52.917124 tar[1141]: linux-amd64/LICENSE Apr 12 18:44:52.921495 tar[1141]: linux-amd64/README.md Apr 12 18:44:52.933858 systemd[1]: Finished prepare-helm.service. Apr 12 18:44:52.937067 tar[1139]: ./ipvlan Apr 12 18:44:52.988331 sshd_keygen[1145]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:44:52.997151 tar[1139]: ./portmap Apr 12 18:44:53.057773 tar[1139]: ./host-local Apr 12 18:44:53.072444 systemd[1]: Finished sshd-keygen.service. Apr 12 18:44:53.082152 systemd[1]: Starting issuegen.service... Apr 12 18:44:53.095463 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:44:53.095720 systemd[1]: Finished issuegen.service. Apr 12 18:44:53.105034 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:44:53.123373 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:44:53.137015 systemd[1]: Started getty@tty1.service. Apr 12 18:44:53.146703 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:44:53.155867 systemd[1]: Reached target getty.target. Apr 12 18:44:53.176079 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:44:53.302948 locksmithd[1174]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:44:56.145127 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Apr 12 18:44:58.461349 kernel: loop0: detected capacity change from 0 to 2097152 Apr 12 18:44:58.484945 systemd-nspawn[1219]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Apr 12 18:44:58.484945 systemd-nspawn[1219]: Press ^] three times within 1s to kill container. Apr 12 18:44:58.501356 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:44:58.590739 systemd[1]: Started oem-gce.service. Apr 12 18:44:58.591218 systemd[1]: Reached target multi-user.target. Apr 12 18:44:58.593358 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:44:58.603416 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:44:58.603661 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:44:58.607512 systemd[1]: Startup finished in 1.061s (kernel) + 29.417s (initrd) + 15.370s (userspace) = 45.849s. Apr 12 18:44:58.708993 systemd-nspawn[1219]: + '[' -e /etc/default/instance_configs.cfg.template ']' Apr 12 18:44:58.709209 systemd-nspawn[1219]: + echo -e '[InstanceSetup]\nset_host_keys = false' Apr 12 18:44:58.709209 systemd-nspawn[1219]: + /usr/bin/google_instance_setup Apr 12 18:44:59.437449 instance-setup[1225]: INFO Running google_set_multiqueue. Apr 12 18:44:59.457843 instance-setup[1225]: INFO Set channels for eth0 to 2. Apr 12 18:44:59.462485 instance-setup[1225]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Apr 12 18:44:59.463868 instance-setup[1225]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Apr 12 18:44:59.464453 instance-setup[1225]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Apr 12 18:44:59.465924 instance-setup[1225]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Apr 12 18:44:59.466260 instance-setup[1225]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Apr 12 18:44:59.467642 instance-setup[1225]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Apr 12 18:44:59.468092 instance-setup[1225]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Apr 12 18:44:59.469533 instance-setup[1225]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Apr 12 18:44:59.481533 instance-setup[1225]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Apr 12 18:44:59.481930 instance-setup[1225]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Apr 12 18:44:59.525607 systemd-nspawn[1219]: + /usr/bin/google_metadata_script_runner --script-type startup Apr 12 18:44:59.697000 systemd[1]: Created slice system-sshd.slice. Apr 12 18:44:59.699036 systemd[1]: Started sshd@0-10.128.0.9:22-139.178.89.65:35520.service. Apr 12 18:44:59.886276 startup-script[1256]: INFO Starting startup scripts. Apr 12 18:44:59.898880 startup-script[1256]: INFO No startup scripts found in metadata. Apr 12 18:44:59.899046 startup-script[1256]: INFO Finished running startup scripts. Apr 12 18:44:59.932508 systemd-nspawn[1219]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Apr 12 18:44:59.932715 systemd-nspawn[1219]: + daemon_pids=() Apr 12 18:44:59.932715 systemd-nspawn[1219]: + for d in accounts clock_skew network Apr 12 18:44:59.932977 systemd-nspawn[1219]: + daemon_pids+=($!) Apr 12 18:44:59.933074 systemd-nspawn[1219]: + for d in accounts clock_skew network Apr 12 18:44:59.933357 systemd-nspawn[1219]: + daemon_pids+=($!) Apr 12 18:44:59.933441 systemd-nspawn[1219]: + for d in accounts clock_skew network Apr 12 18:44:59.933625 systemd-nspawn[1219]: + /usr/bin/google_clock_skew_daemon Apr 12 18:44:59.933792 systemd-nspawn[1219]: + daemon_pids+=($!) Apr 12 18:44:59.933932 systemd-nspawn[1219]: + NOTIFY_SOCKET=/run/systemd/notify Apr 12 18:44:59.934000 systemd-nspawn[1219]: + /usr/bin/systemd-notify --ready Apr 12 18:44:59.934605 systemd-nspawn[1219]: + /usr/bin/google_accounts_daemon Apr 12 18:44:59.934853 systemd-nspawn[1219]: + /usr/bin/google_network_daemon Apr 12 18:44:59.998719 systemd-nspawn[1219]: + wait -n 36 37 38 Apr 12 18:45:00.083340 sshd[1258]: Accepted publickey for core from 139.178.89.65 port 35520 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:00.088053 sshd[1258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:00.106879 systemd[1]: Created slice user-500.slice. Apr 12 18:45:00.108850 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:45:00.128399 systemd-logind[1132]: New session 1 of user core. Apr 12 18:45:00.135605 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:45:00.140191 systemd[1]: Starting user@500.service... Apr 12 18:45:00.165356 (systemd)[1267]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:00.390702 systemd[1267]: Queued start job for default target default.target. Apr 12 18:45:00.391590 systemd[1267]: Reached target paths.target. Apr 12 18:45:00.391647 systemd[1267]: Reached target sockets.target. Apr 12 18:45:00.391672 systemd[1267]: Reached target timers.target. Apr 12 18:45:00.391694 systemd[1267]: Reached target basic.target. Apr 12 18:45:00.391868 systemd[1]: Started user@500.service. Apr 12 18:45:00.393438 systemd[1]: Started session-1.scope. Apr 12 18:45:00.394057 systemd[1267]: Reached target default.target. Apr 12 18:45:00.394342 systemd[1267]: Startup finished in 210ms. Apr 12 18:45:00.664012 systemd[1]: Started sshd@1-10.128.0.9:22-139.178.89.65:35532.service. Apr 12 18:45:00.827154 google-clock-skew[1263]: INFO Starting Google Clock Skew daemon. Apr 12 18:45:00.846613 google-clock-skew[1263]: INFO Clock drift token has changed: 0. Apr 12 18:45:00.852341 systemd-nspawn[1219]: hwclock: Cannot access the Hardware Clock via any known method. Apr 12 18:45:00.852341 systemd-nspawn[1219]: hwclock: Use the --verbose option to see the details of our search for an access method. Apr 12 18:45:00.853102 google-clock-skew[1263]: WARNING Failed to sync system time with hardware clock. Apr 12 18:45:00.879571 groupadd[1285]: group added to /etc/group: name=google-sudoers, GID=1000 Apr 12 18:45:00.883868 groupadd[1285]: group added to /etc/gshadow: name=google-sudoers Apr 12 18:45:00.889709 groupadd[1285]: new group: name=google-sudoers, GID=1000 Apr 12 18:45:00.904785 google-accounts[1262]: INFO Starting Google Accounts daemon. Apr 12 18:45:00.947418 google-accounts[1262]: WARNING OS Login not installed. Apr 12 18:45:00.949341 google-accounts[1262]: INFO Creating a new user account for 0. Apr 12 18:45:00.958898 systemd-nspawn[1219]: useradd: invalid user name '0': use --badname to ignore Apr 12 18:45:00.959773 google-accounts[1262]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Apr 12 18:45:00.976534 google-networking[1264]: INFO Starting Google Networking daemon. Apr 12 18:45:01.036033 sshd[1278]: Accepted publickey for core from 139.178.89.65 port 35532 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:01.038063 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:01.044917 systemd-logind[1132]: New session 2 of user core. Apr 12 18:45:01.046576 systemd[1]: Started session-2.scope. Apr 12 18:45:01.292994 sshd[1278]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:01.297789 systemd[1]: sshd@1-10.128.0.9:22-139.178.89.65:35532.service: Deactivated successfully. Apr 12 18:45:01.298851 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:45:01.299749 systemd-logind[1132]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:45:01.301042 systemd-logind[1132]: Removed session 2. Apr 12 18:45:01.347804 systemd[1]: Started sshd@2-10.128.0.9:22-139.178.89.65:35542.service. Apr 12 18:45:01.692924 sshd[1300]: Accepted publickey for core from 139.178.89.65 port 35542 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:01.695050 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:01.701393 systemd-logind[1132]: New session 3 of user core. Apr 12 18:45:01.701962 systemd[1]: Started session-3.scope. Apr 12 18:45:01.939848 sshd[1300]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:01.944263 systemd[1]: sshd@2-10.128.0.9:22-139.178.89.65:35542.service: Deactivated successfully. Apr 12 18:45:01.945397 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:45:01.946293 systemd-logind[1132]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:45:01.947593 systemd-logind[1132]: Removed session 3. Apr 12 18:45:01.995472 systemd[1]: Started sshd@3-10.128.0.9:22-139.178.89.65:35552.service. Apr 12 18:45:02.340832 sshd[1307]: Accepted publickey for core from 139.178.89.65 port 35552 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:02.342702 sshd[1307]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:02.349413 systemd-logind[1132]: New session 4 of user core. Apr 12 18:45:02.349699 systemd[1]: Started session-4.scope. Apr 12 18:45:02.592564 sshd[1307]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:02.596761 systemd[1]: sshd@3-10.128.0.9:22-139.178.89.65:35552.service: Deactivated successfully. Apr 12 18:45:02.597797 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:45:02.598691 systemd-logind[1132]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:45:02.600057 systemd-logind[1132]: Removed session 4. Apr 12 18:45:02.648462 systemd[1]: Started sshd@4-10.128.0.9:22-139.178.89.65:35554.service. Apr 12 18:45:02.995657 sshd[1313]: Accepted publickey for core from 139.178.89.65 port 35554 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:02.997608 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:03.004652 systemd[1]: Started session-5.scope. Apr 12 18:45:03.005322 systemd-logind[1132]: New session 5 of user core. Apr 12 18:45:03.223554 sudo[1316]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:45:03.223955 sudo[1316]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:45:03.234647 dbus-daemon[1104]: \xd0ݱˑU: received setenforce notice (enforcing=1313262640) Apr 12 18:45:03.236858 sudo[1316]: pam_unix(sudo:session): session closed for user root Apr 12 18:45:03.291041 sshd[1313]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:03.295944 systemd[1]: sshd@4-10.128.0.9:22-139.178.89.65:35554.service: Deactivated successfully. Apr 12 18:45:03.297107 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:45:03.298060 systemd-logind[1132]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:45:03.299451 systemd-logind[1132]: Removed session 5. Apr 12 18:45:03.345953 systemd[1]: Started sshd@5-10.128.0.9:22-139.178.89.65:35562.service. Apr 12 18:45:03.691696 sshd[1320]: Accepted publickey for core from 139.178.89.65 port 35562 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:03.693787 sshd[1320]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:03.700572 systemd[1]: Started session-6.scope. Apr 12 18:45:03.701622 systemd-logind[1132]: New session 6 of user core. Apr 12 18:45:03.897374 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:45:03.897774 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:45:03.901891 sudo[1324]: pam_unix(sudo:session): session closed for user root Apr 12 18:45:03.913911 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:45:03.914289 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:45:03.927194 systemd[1]: Stopping audit-rules.service... Apr 12 18:45:03.928000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:45:03.934657 kernel: kauditd_printk_skb: 186 callbacks suppressed Apr 12 18:45:03.934801 kernel: audit: type=1305 audit(1712947503.928:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:45:03.934855 auditctl[1327]: No rules Apr 12 18:45:03.928000 audit[1327]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd767e1fc0 a2=420 a3=0 items=0 ppid=1 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.935851 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:45:03.936108 systemd[1]: Stopped audit-rules.service. Apr 12 18:45:03.952623 systemd[1]: Starting audit-rules.service... Apr 12 18:45:03.928000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:45:03.989723 kernel: audit: type=1300 audit(1712947503.928:169): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd767e1fc0 a2=420 a3=0 items=0 ppid=1 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.989850 kernel: audit: type=1327 audit(1712947503.928:169): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:45:03.989885 kernel: audit: type=1131 audit(1712947503.935:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.992865 augenrules[1344]: No rules Apr 12 18:45:03.994147 systemd[1]: Finished audit-rules.service. Apr 12 18:45:03.995792 sudo[1323]: pam_unix(sudo:session): session closed for user root Apr 12 18:45:04.013369 kernel: audit: type=1130 audit(1712947503.994:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.994000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.995000 audit[1323]: USER_END pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.052817 sshd[1320]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:04.058616 systemd[1]: sshd@5-10.128.0.9:22-139.178.89.65:35562.service: Deactivated successfully. Apr 12 18:45:04.059763 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:45:04.061706 systemd-logind[1132]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:45:04.062758 kernel: audit: type=1106 audit(1712947503.995:172): pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.995000 audit[1323]: CRED_DISP pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.064013 systemd-logind[1132]: Removed session 6. Apr 12 18:45:04.085816 kernel: audit: type=1104 audit(1712947503.995:173): pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.051000 audit[1320]: USER_END pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.086473 kernel: audit: type=1106 audit(1712947504.051:174): pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.123330 kernel: audit: type=1104 audit(1712947504.051:175): pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.051000 audit[1320]: CRED_DISP pid=1320 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.125723 systemd[1]: Started sshd@6-10.128.0.9:22-139.178.89.65:35578.service. Apr 12 18:45:04.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.9:22-139.178.89.65:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.170034 kernel: audit: type=1131 audit(1712947504.056:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.9:22-139.178.89.65:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.9:22-139.178.89.65:35578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.467000 audit[1350]: USER_ACCT pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.469535 sshd[1350]: Accepted publickey for core from 139.178.89.65 port 35578 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:45:04.469000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.469000 audit[1350]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf83f2ce0 a2=3 a3=0 items=0 ppid=1 pid=1350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:04.469000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:04.471490 sshd[1350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:04.477909 systemd-logind[1132]: New session 7 of user core. Apr 12 18:45:04.478565 systemd[1]: Started session-7.scope. Apr 12 18:45:04.485000 audit[1350]: USER_START pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.488000 audit[1352]: CRED_ACQ pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:04.674000 audit[1353]: USER_ACCT pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.676166 sudo[1353]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:45:04.675000 audit[1353]: CRED_REFR pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.676610 sudo[1353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:45:04.677000 audit[1353]: USER_START pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:05.290485 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:45:05.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:05.298914 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:45:05.299490 systemd[1]: Reached target network-online.target. Apr 12 18:45:05.301496 systemd[1]: Starting docker.service... Apr 12 18:45:05.356554 env[1369]: time="2024-04-12T18:45:05.356477688Z" level=info msg="Starting up" Apr 12 18:45:05.358189 env[1369]: time="2024-04-12T18:45:05.358132841Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:45:05.358189 env[1369]: time="2024-04-12T18:45:05.358161399Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:45:05.359091 env[1369]: time="2024-04-12T18:45:05.358191291Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:45:05.359091 env[1369]: time="2024-04-12T18:45:05.358207589Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:45:05.360788 env[1369]: time="2024-04-12T18:45:05.360730338Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:45:05.360788 env[1369]: time="2024-04-12T18:45:05.360753864Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:45:05.360788 env[1369]: time="2024-04-12T18:45:05.360776444Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:45:05.360998 env[1369]: time="2024-04-12T18:45:05.360801300Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:45:05.370437 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1792697026-merged.mount: Deactivated successfully. Apr 12 18:45:05.411796 env[1369]: time="2024-04-12T18:45:05.411748509Z" level=info msg="Loading containers: start." Apr 12 18:45:05.496000 audit[1399]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.496000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcfd2ff0a0 a2=0 a3=7ffcfd2ff08c items=0 ppid=1369 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.496000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:45:05.499000 audit[1401]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.499000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd172e0f30 a2=0 a3=7ffd172e0f1c items=0 ppid=1369 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.499000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:45:05.502000 audit[1403]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.502000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffccee65ba0 a2=0 a3=7ffccee65b8c items=0 ppid=1369 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.502000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:45:05.505000 audit[1405]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.505000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2f919180 a2=0 a3=7ffd2f91916c items=0 ppid=1369 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:45:05.509000 audit[1407]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.509000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4f792090 a2=0 a3=7ffc4f79207c items=0 ppid=1369 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.509000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:45:05.531000 audit[1412]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.531000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9e8145d0 a2=0 a3=7fff9e8145bc items=0 ppid=1369 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:45:05.545000 audit[1414]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.545000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca49e07b0 a2=0 a3=7ffca49e079c items=0 ppid=1369 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.545000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:45:05.549000 audit[1416]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.549000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe9ddac780 a2=0 a3=7ffe9ddac76c items=0 ppid=1369 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.549000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:45:05.552000 audit[1418]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.552000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe1b2ff520 a2=0 a3=7ffe1b2ff50c items=0 ppid=1369 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.552000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:45:05.568000 audit[1422]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.568000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffdef3741d0 a2=0 a3=7ffdef3741bc items=0 ppid=1369 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:45:05.570000 audit[1423]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.570000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff0bc183a0 a2=0 a3=7fff0bc1838c items=0 ppid=1369 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:45:05.588329 kernel: Initializing XFRM netlink socket Apr 12 18:45:05.635282 env[1369]: time="2024-04-12T18:45:05.635228673Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:45:05.672000 audit[1431]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.672000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdb0fb4080 a2=0 a3=7ffdb0fb406c items=0 ppid=1369 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.672000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:45:05.685000 audit[1434]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.685000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff19d570c0 a2=0 a3=7fff19d570ac items=0 ppid=1369 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:45:05.690000 audit[1437]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.690000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffa65003f0 a2=0 a3=7fffa65003dc items=0 ppid=1369 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:45:05.693000 audit[1439]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.693000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdbda3d140 a2=0 a3=7ffdbda3d12c items=0 ppid=1369 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.693000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:45:05.696000 audit[1441]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.696000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc698f6dc0 a2=0 a3=7ffc698f6dac items=0 ppid=1369 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.696000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:45:05.700000 audit[1443]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.700000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffda7338680 a2=0 a3=7ffda733866c items=0 ppid=1369 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:45:05.703000 audit[1445]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.703000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeff792af0 a2=0 a3=7ffeff792adc items=0 ppid=1369 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:45:05.716000 audit[1448]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.716000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd3cef45f0 a2=0 a3=7ffd3cef45dc items=0 ppid=1369 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.716000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:45:05.720000 audit[1450]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.720000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd26078570 a2=0 a3=7ffd2607855c items=0 ppid=1369 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.720000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:45:05.723000 audit[1452]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.723000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd1f60d8f0 a2=0 a3=7ffd1f60d8dc items=0 ppid=1369 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.723000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:45:05.728000 audit[1454]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.728000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5c4bb6f0 a2=0 a3=7ffe5c4bb6dc items=0 ppid=1369 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:45:05.730898 systemd-networkd[1025]: docker0: Link UP Apr 12 18:45:05.746000 audit[1458]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.746000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd8d885460 a2=0 a3=7ffd8d88544c items=0 ppid=1369 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:45:05.748000 audit[1459]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:05.748000 audit[1459]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc530195e0 a2=0 a3=7ffc530195cc items=0 ppid=1369 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:05.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:45:05.750395 env[1369]: time="2024-04-12T18:45:05.750337074Z" level=info msg="Loading containers: done." Apr 12 18:45:05.767209 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck723432497-merged.mount: Deactivated successfully. Apr 12 18:45:05.778507 env[1369]: time="2024-04-12T18:45:05.778445830Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:45:05.778785 env[1369]: time="2024-04-12T18:45:05.778743344Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:45:05.778974 env[1369]: time="2024-04-12T18:45:05.778892604Z" level=info msg="Daemon has completed initialization" Apr 12 18:45:05.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:05.800838 systemd[1]: Started docker.service. Apr 12 18:45:05.815263 env[1369]: time="2024-04-12T18:45:05.815025960Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:45:05.840883 systemd[1]: Reloading. Apr 12 18:45:05.968257 /usr/lib/systemd/system-generators/torcx-generator[1508]: time="2024-04-12T18:45:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:45:05.969037 /usr/lib/systemd/system-generators/torcx-generator[1508]: time="2024-04-12T18:45:05Z" level=info msg="torcx already run" Apr 12 18:45:06.066627 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:45:06.066657 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:45:06.093689 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit: BPF prog-id=37 op=LOAD Apr 12 18:45:06.181000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit: BPF prog-id=38 op=LOAD Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.181000 audit: BPF prog-id=39 op=LOAD Apr 12 18:45:06.182000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:45:06.182000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.183000 audit: BPF prog-id=40 op=LOAD Apr 12 18:45:06.183000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.203000 audit: BPF prog-id=41 op=LOAD Apr 12 18:45:06.203000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit: BPF prog-id=42 op=LOAD Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.204000 audit: BPF prog-id=43 op=LOAD Apr 12 18:45:06.204000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:45:06.204000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.206000 audit: BPF prog-id=44 op=LOAD Apr 12 18:45:06.206000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.207000 audit: BPF prog-id=45 op=LOAD Apr 12 18:45:06.207000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit: BPF prog-id=46 op=LOAD Apr 12 18:45:06.209000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit: BPF prog-id=47 op=LOAD Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.209000 audit: BPF prog-id=48 op=LOAD Apr 12 18:45:06.209000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:45:06.209000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.210000 audit: BPF prog-id=49 op=LOAD Apr 12 18:45:06.210000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit: BPF prog-id=50 op=LOAD Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.213000 audit: BPF prog-id=51 op=LOAD Apr 12 18:45:06.213000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:45:06.213000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit: BPF prog-id=52 op=LOAD Apr 12 18:45:06.217000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit: BPF prog-id=53 op=LOAD Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:06.218000 audit: BPF prog-id=54 op=LOAD Apr 12 18:45:06.218000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:45:06.218000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:45:06.240572 systemd[1]: Started kubelet.service. Apr 12 18:45:06.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:06.342358 kubelet[1550]: E0412 18:45:06.339676 1550 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:45:06.346920 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:45:06.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:45:06.347135 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:45:06.999137 env[1143]: time="2024-04-12T18:45:06.999075852Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 18:45:07.525356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount141787227.mount: Deactivated successfully. Apr 12 18:45:09.587272 env[1143]: time="2024-04-12T18:45:09.587194655Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:09.590412 env[1143]: time="2024-04-12T18:45:09.590365673Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:09.593356 env[1143]: time="2024-04-12T18:45:09.593312042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:09.595767 env[1143]: time="2024-04-12T18:45:09.595727383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:09.596721 env[1143]: time="2024-04-12T18:45:09.596667548Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142\"" Apr 12 18:45:09.611741 env[1143]: time="2024-04-12T18:45:09.611677992Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 18:45:11.601148 env[1143]: time="2024-04-12T18:45:11.601076239Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:11.604657 env[1143]: time="2024-04-12T18:45:11.604607073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:11.607682 env[1143]: time="2024-04-12T18:45:11.607641116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:11.610294 env[1143]: time="2024-04-12T18:45:11.610249084Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:11.611542 env[1143]: time="2024-04-12T18:45:11.611498697Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad\"" Apr 12 18:45:11.628605 env[1143]: time="2024-04-12T18:45:11.628548648Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 18:45:12.987624 env[1143]: time="2024-04-12T18:45:12.987552187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:12.991152 env[1143]: time="2024-04-12T18:45:12.991098487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:12.993504 env[1143]: time="2024-04-12T18:45:12.993464855Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:12.996104 env[1143]: time="2024-04-12T18:45:12.996056384Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:12.997249 env[1143]: time="2024-04-12T18:45:12.997185808Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4\"" Apr 12 18:45:13.011943 env[1143]: time="2024-04-12T18:45:13.011879616Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:45:14.175266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3053367266.mount: Deactivated successfully. Apr 12 18:45:14.871486 env[1143]: time="2024-04-12T18:45:14.871392200Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:14.874329 env[1143]: time="2024-04-12T18:45:14.874258424Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:14.876836 env[1143]: time="2024-04-12T18:45:14.876792867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:14.879125 env[1143]: time="2024-04-12T18:45:14.879079550Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:14.879952 env[1143]: time="2024-04-12T18:45:14.879906658Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 18:45:14.895950 env[1143]: time="2024-04-12T18:45:14.895893099Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:45:15.315343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1918511705.mount: Deactivated successfully. Apr 12 18:45:15.324142 env[1143]: time="2024-04-12T18:45:15.323973622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:15.327852 env[1143]: time="2024-04-12T18:45:15.327791383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:15.331900 env[1143]: time="2024-04-12T18:45:15.331839941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:15.334948 env[1143]: time="2024-04-12T18:45:15.334875067Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:15.336237 env[1143]: time="2024-04-12T18:45:15.336186896Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:45:15.354766 env[1143]: time="2024-04-12T18:45:15.354701167Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 18:45:15.776551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2103554689.mount: Deactivated successfully. Apr 12 18:45:16.408582 kernel: kauditd_printk_skb: 293 callbacks suppressed Apr 12 18:45:16.408727 kernel: audit: type=1130 audit(1712947516.377:420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:16.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:16.377201 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:45:16.377553 systemd[1]: Stopped kubelet.service. Apr 12 18:45:16.407941 systemd[1]: Started kubelet.service. Apr 12 18:45:16.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:16.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:16.455557 kernel: audit: type=1131 audit(1712947516.377:421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:16.455740 kernel: audit: type=1130 audit(1712947516.407:422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:16.529675 kubelet[1595]: E0412 18:45:16.529620 1595 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:45:16.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:45:16.535362 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:45:16.535702 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:45:16.559340 kernel: audit: type=1131 audit(1712947516.536:423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:45:20.724352 env[1143]: time="2024-04-12T18:45:20.724244738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:20.727435 env[1143]: time="2024-04-12T18:45:20.727384295Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:20.734834 env[1143]: time="2024-04-12T18:45:20.734787008Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:20.737419 env[1143]: time="2024-04-12T18:45:20.737369858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:20.738515 env[1143]: time="2024-04-12T18:45:20.738469906Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Apr 12 18:45:20.753664 env[1143]: time="2024-04-12T18:45:20.753604478Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:45:21.185474 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2359483160.mount: Deactivated successfully. Apr 12 18:45:21.643336 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Apr 12 18:45:21.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:21.670494 kernel: audit: type=1131 audit(1712947521.642:424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:21.685000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:45:21.694319 kernel: audit: type=1334 audit(1712947521.685:425): prog-id=43 op=UNLOAD Apr 12 18:45:21.694461 kernel: audit: type=1334 audit(1712947521.685:426): prog-id=42 op=UNLOAD Apr 12 18:45:21.685000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:45:21.685000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:45:21.708857 kernel: audit: type=1334 audit(1712947521.685:427): prog-id=41 op=UNLOAD Apr 12 18:45:22.082576 env[1143]: time="2024-04-12T18:45:22.082407549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:22.086477 env[1143]: time="2024-04-12T18:45:22.086427383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:22.088643 env[1143]: time="2024-04-12T18:45:22.088597516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:22.091168 env[1143]: time="2024-04-12T18:45:22.091114666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:22.091936 env[1143]: time="2024-04-12T18:45:22.091876917Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 18:45:26.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:26.039999 systemd[1]: Stopped kubelet.service. Apr 12 18:45:26.084699 kernel: audit: type=1130 audit(1712947526.038:428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:26.084871 kernel: audit: type=1131 audit(1712947526.045:429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:26.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:26.080323 systemd[1]: Reloading. Apr 12 18:45:26.201217 /usr/lib/systemd/system-generators/torcx-generator[1691]: time="2024-04-12T18:45:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:45:26.203953 /usr/lib/systemd/system-generators/torcx-generator[1691]: time="2024-04-12T18:45:26Z" level=info msg="torcx already run" Apr 12 18:45:26.302823 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:45:26.302856 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:45:26.330598 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.435331 kernel: audit: type=1400 audit(1712947526.413:430): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.435499 kernel: audit: type=1400 audit(1712947526.413:431): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.456340 kernel: audit: type=1400 audit(1712947526.413:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.497924 kernel: audit: type=1400 audit(1712947526.413:433): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit: BPF prog-id=55 op=LOAD Apr 12 18:45:26.434000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit: BPF prog-id=56 op=LOAD Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit: BPF prog-id=57 op=LOAD Apr 12 18:45:26.476000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:45:26.476000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.496000 audit: BPF prog-id=58 op=LOAD Apr 12 18:45:26.496000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.500000 audit: BPF prog-id=59 op=LOAD Apr 12 18:45:26.500000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.502000 audit: BPF prog-id=60 op=LOAD Apr 12 18:45:26.502000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit: BPF prog-id=61 op=LOAD Apr 12 18:45:26.503000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit: BPF prog-id=62 op=LOAD Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.503000 audit: BPF prog-id=63 op=LOAD Apr 12 18:45:26.503000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:45:26.503000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:45:26.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.505000 audit: BPF prog-id=64 op=LOAD Apr 12 18:45:26.505000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit: BPF prog-id=65 op=LOAD Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.507000 audit: BPF prog-id=66 op=LOAD Apr 12 18:45:26.507000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:45:26.507000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit: BPF prog-id=67 op=LOAD Apr 12 18:45:26.512000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.512000 audit: BPF prog-id=68 op=LOAD Apr 12 18:45:26.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:26.513000 audit: BPF prog-id=69 op=LOAD Apr 12 18:45:26.513000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:45:26.513000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:45:26.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:26.538860 systemd[1]: Started kubelet.service. Apr 12 18:45:26.607718 kubelet[1735]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:45:26.608209 kubelet[1735]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:45:26.608334 kubelet[1735]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:45:26.608571 kubelet[1735]: I0412 18:45:26.608518 1735 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:45:27.254794 kubelet[1735]: I0412 18:45:27.254716 1735 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:45:27.254794 kubelet[1735]: I0412 18:45:27.254768 1735 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:45:27.255171 kubelet[1735]: I0412 18:45:27.255131 1735 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:45:27.261319 kubelet[1735]: E0412 18:45:27.261262 1735 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.9:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.261613 kubelet[1735]: I0412 18:45:27.261592 1735 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:45:27.289592 kubelet[1735]: I0412 18:45:27.289554 1735 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:45:27.290418 kubelet[1735]: I0412 18:45:27.290393 1735 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:45:27.290860 kubelet[1735]: I0412 18:45:27.290837 1735 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:45:27.291139 kubelet[1735]: I0412 18:45:27.291119 1735 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:45:27.291249 kubelet[1735]: I0412 18:45:27.291235 1735 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:45:27.291534 kubelet[1735]: I0412 18:45:27.291516 1735 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:45:27.291789 kubelet[1735]: I0412 18:45:27.291772 1735 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:45:27.291954 kubelet[1735]: I0412 18:45:27.291917 1735 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:45:27.292044 kubelet[1735]: I0412 18:45:27.291994 1735 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:45:27.292044 kubelet[1735]: I0412 18:45:27.292026 1735 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:45:27.292927 kubelet[1735]: W0412 18:45:27.292872 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.293101 kubelet[1735]: E0412 18:45:27.293083 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.293357 kubelet[1735]: I0412 18:45:27.293340 1735 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:45:27.294613 kubelet[1735]: W0412 18:45:27.294562 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.9:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.294780 kubelet[1735]: E0412 18:45:27.294762 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.9:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.298690 kubelet[1735]: W0412 18:45:27.298667 1735 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:45:27.299512 kubelet[1735]: I0412 18:45:27.299474 1735 server.go:1232] "Started kubelet" Apr 12 18:45:27.301630 kubelet[1735]: E0412 18:45:27.301596 1735 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:45:27.301630 kubelet[1735]: E0412 18:45:27.301632 1735 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:45:27.302034 kubelet[1735]: E0412 18:45:27.301894 1735 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal.17c59cb3539137e6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", UID:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 45, 27, 299446758, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 45, 27, 299446758, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal"}': 'Post "https://10.128.0.9:6443/api/v1/namespaces/default/events": dial tcp 10.128.0.9:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:45:27.302219 kubelet[1735]: I0412 18:45:27.302197 1735 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:45:27.301000 audit[1735]: AVC avc: denied { mac_admin } for pid=1735 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:27.307520 kubelet[1735]: I0412 18:45:27.302756 1735 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:45:27.307520 kubelet[1735]: I0412 18:45:27.302820 1735 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:45:27.307520 kubelet[1735]: I0412 18:45:27.303865 1735 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:45:27.314362 kernel: kauditd_printk_skb: 169 callbacks suppressed Apr 12 18:45:27.314536 kernel: audit: type=1400 audit(1712947527.301:603): avc: denied { mac_admin } for pid=1735 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:27.314709 kubelet[1735]: I0412 18:45:27.314676 1735 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:45:27.314884 kubelet[1735]: I0412 18:45:27.314868 1735 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:45:27.315183 kubelet[1735]: I0412 18:45:27.315164 1735 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:45:27.322536 kubelet[1735]: I0412 18:45:27.322506 1735 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:45:27.323037 kubelet[1735]: I0412 18:45:27.323012 1735 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:45:27.323263 kubelet[1735]: I0412 18:45:27.323246 1735 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:45:27.324012 kubelet[1735]: W0412 18:45:27.323953 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.324886 kubelet[1735]: E0412 18:45:27.324700 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.325558 kubelet[1735]: E0412 18:45:27.325534 1735 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.9:6443: connect: connection refused" interval="200ms" Apr 12 18:45:27.301000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:27.358332 kernel: audit: type=1401 audit(1712947527.301:603): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:27.301000 audit[1735]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000904b40 a1=c000845758 a2=c000904b10 a3=25 items=0 ppid=1 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.398326 kernel: audit: type=1300 audit(1712947527.301:603): arch=c000003e syscall=188 success=no exit=-22 a0=c000904b40 a1=c000845758 a2=c000904b10 a3=25 items=0 ppid=1 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.301000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:27.432321 kernel: audit: type=1327 audit(1712947527.301:603): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:27.433907 kubelet[1735]: I0412 18:45:27.433865 1735 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:45:27.313000 audit[1735]: AVC avc: denied { mac_admin } for pid=1735 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:27.441415 kubelet[1735]: I0412 18:45:27.441377 1735 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:45:27.441728 kubelet[1735]: I0412 18:45:27.441697 1735 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:45:27.441872 kubelet[1735]: I0412 18:45:27.441858 1735 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:45:27.442076 kubelet[1735]: E0412 18:45:27.442063 1735 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:45:27.443989 kubelet[1735]: W0412 18:45:27.443930 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.444387 kubelet[1735]: E0412 18:45:27.444355 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:27.445336 kubelet[1735]: I0412 18:45:27.445275 1735 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:27.447070 kubelet[1735]: E0412 18:45:27.447050 1735 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.9:6443/api/v1/nodes\": dial tcp 10.128.0.9:6443: connect: connection refused" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:27.448049 kubelet[1735]: I0412 18:45:27.448020 1735 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:45:27.448209 kubelet[1735]: I0412 18:45:27.448196 1735 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:45:27.448370 kubelet[1735]: I0412 18:45:27.448357 1735 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:45:27.313000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:27.473452 kernel: audit: type=1400 audit(1712947527.313:604): avc: denied { mac_admin } for pid=1735 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:27.473611 kernel: audit: type=1401 audit(1712947527.313:604): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:27.473648 kernel: audit: type=1300 audit(1712947527.313:604): arch=c000003e syscall=188 success=no exit=-22 a0=c0008684c0 a1=c000845770 a2=c000904bd0 a3=25 items=0 ppid=1 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.313000 audit[1735]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008684c0 a1=c000845770 a2=c000904bd0 a3=25 items=0 ppid=1 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.313000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:27.526893 kubelet[1735]: E0412 18:45:27.526848 1735 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.9:6443: connect: connection refused" interval="400ms" Apr 12 18:45:27.530142 kubelet[1735]: I0412 18:45:27.530097 1735 policy_none.go:49] "None policy: Start" Apr 12 18:45:27.531831 kubelet[1735]: I0412 18:45:27.531781 1735 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:45:27.532072 kubelet[1735]: I0412 18:45:27.532056 1735 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:45:27.539884 kernel: audit: type=1327 audit(1712947527.313:604): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:27.540067 kernel: audit: type=1325 audit(1712947527.368:605): table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.368000 audit[1748]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.368000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3a312b10 a2=0 a3=7ffd3a312afc items=0 ppid=1735 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.557587 kubelet[1735]: E0412 18:45:27.557557 1735 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:45:27.589571 kernel: audit: type=1300 audit(1712947527.368:605): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3a312b10 a2=0 a3=7ffd3a312afc items=0 ppid=1735 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:45:27.373000 audit[1749]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.373000 audit[1749]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe13131730 a2=0 a3=7ffe1313171c items=0 ppid=1735 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:45:27.373000 audit[1751]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.373000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe2c7bcf70 a2=0 a3=7ffe2c7bcf5c items=0 ppid=1735 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:45:27.378000 audit[1753]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.378000 audit[1753]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff45a57780 a2=0 a3=7fff45a5776c items=0 ppid=1735 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:45:27.431000 audit[1756]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.431000 audit[1756]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc79756e40 a2=0 a3=7ffc79756e2c items=0 ppid=1735 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:45:27.433000 audit[1759]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1759 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:27.433000 audit[1759]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd42ffd0c0 a2=0 a3=7ffd42ffd0ac items=0 ppid=1735 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:45:27.439000 audit[1760]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.439000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4b407090 a2=0 a3=7ffc4b40707c items=0 ppid=1735 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:45:27.449000 audit[1761]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.449000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd73f52680 a2=0 a3=7ffd73f5266c items=0 ppid=1735 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:45:27.449000 audit[1762]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:27.449000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcbfa69a10 a2=0 a3=7ffcbfa699fc items=0 ppid=1735 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:45:27.454000 audit[1763]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:27.454000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe00df360 a2=0 a3=7fffe00df34c items=0 ppid=1735 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:45:27.454000 audit[1764]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:27.454000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe270a3a60 a2=0 a3=7ffe270a3a4c items=0 ppid=1735 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:45:27.459000 audit[1765]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:27.459000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca01d4720 a2=0 a3=7ffca01d470c items=0 ppid=1735 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.459000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:45:27.670165 kubelet[1735]: I0412 18:45:27.670112 1735 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:27.671150 kubelet[1735]: E0412 18:45:27.671119 1735 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.9:6443/api/v1/nodes\": dial tcp 10.128.0.9:6443: connect: connection refused" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:27.758528 kubelet[1735]: E0412 18:45:27.758361 1735 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:45:27.809817 systemd[1]: Created slice kubepods.slice. Apr 12 18:45:27.821588 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:45:27.826493 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:45:27.832763 kubelet[1735]: I0412 18:45:27.832720 1735 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:45:27.832000 audit[1735]: AVC avc: denied { mac_admin } for pid=1735 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:27.832000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:27.832000 audit[1735]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010127e0 a1=c00101e630 a2=c0010127b0 a3=25 items=0 ppid=1 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:27.832000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:27.834340 kubelet[1735]: I0412 18:45:27.834272 1735 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:45:27.835114 kubelet[1735]: I0412 18:45:27.835075 1735 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:45:27.838406 kubelet[1735]: E0412 18:45:27.838377 1735 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" not found" Apr 12 18:45:27.928076 kubelet[1735]: E0412 18:45:27.928001 1735 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.9:6443: connect: connection refused" interval="800ms" Apr 12 18:45:28.093327 kubelet[1735]: I0412 18:45:28.093131 1735 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.094320 kubelet[1735]: E0412 18:45:28.094267 1735 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.9:6443/api/v1/nodes\": dial tcp 10.128.0.9:6443: connect: connection refused" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.135702 kubelet[1735]: W0412 18:45:28.135639 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.128.0.9:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.135702 kubelet[1735]: E0412 18:45:28.135700 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.9:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.159114 kubelet[1735]: I0412 18:45:28.159011 1735 topology_manager.go:215] "Topology Admit Handler" podUID="8a98eaa3f2d145ad4e57bb5d86a54a16" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.178284 kubelet[1735]: I0412 18:45:28.178249 1735 topology_manager.go:215] "Topology Admit Handler" podUID="74da20c0c24576daebfd222113b17909" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.184990 kubelet[1735]: I0412 18:45:28.184962 1735 topology_manager.go:215] "Topology Admit Handler" podUID="05c10a61b3afd54e107f15858b90b09c" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.191446 systemd[1]: Created slice kubepods-burstable-pod8a98eaa3f2d145ad4e57bb5d86a54a16.slice. Apr 12 18:45:28.211774 systemd[1]: Created slice kubepods-burstable-pod74da20c0c24576daebfd222113b17909.slice. Apr 12 18:45:28.225712 systemd[1]: Created slice kubepods-burstable-pod05c10a61b3afd54e107f15858b90b09c.slice. Apr 12 18:45:28.237925 kubelet[1735]: I0412 18:45:28.237854 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.237925 kubelet[1735]: I0412 18:45:28.237927 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238223 kubelet[1735]: I0412 18:45:28.237967 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/05c10a61b3afd54e107f15858b90b09c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"05c10a61b3afd54e107f15858b90b09c\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238223 kubelet[1735]: I0412 18:45:28.238015 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238223 kubelet[1735]: I0412 18:45:28.238051 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238223 kubelet[1735]: I0412 18:45:28.238133 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238462 kubelet[1735]: I0412 18:45:28.238169 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/74da20c0c24576daebfd222113b17909-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"74da20c0c24576daebfd222113b17909\") " pod="kube-system/kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238462 kubelet[1735]: I0412 18:45:28.238209 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/05c10a61b3afd54e107f15858b90b09c-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"05c10a61b3afd54e107f15858b90b09c\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.238462 kubelet[1735]: I0412 18:45:28.238248 1735 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/05c10a61b3afd54e107f15858b90b09c-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"05c10a61b3afd54e107f15858b90b09c\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.257274 kubelet[1735]: W0412 18:45:28.257137 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.128.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.257274 kubelet[1735]: E0412 18:45:28.257263 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.274106 kubelet[1735]: W0412 18:45:28.274024 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.128.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.274106 kubelet[1735]: E0412 18:45:28.274099 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal&limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.485894 kubelet[1735]: W0412 18:45:28.485815 1735 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.128.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.485894 kubelet[1735]: E0412 18:45:28.485902 1735 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:28.508341 env[1143]: time="2024-04-12T18:45:28.508257882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal,Uid:8a98eaa3f2d145ad4e57bb5d86a54a16,Namespace:kube-system,Attempt:0,}" Apr 12 18:45:28.524632 env[1143]: time="2024-04-12T18:45:28.524570194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal,Uid:74da20c0c24576daebfd222113b17909,Namespace:kube-system,Attempt:0,}" Apr 12 18:45:28.529983 env[1143]: time="2024-04-12T18:45:28.529908521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal,Uid:05c10a61b3afd54e107f15858b90b09c,Namespace:kube-system,Attempt:0,}" Apr 12 18:45:28.728802 kubelet[1735]: E0412 18:45:28.728757 1735 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal?timeout=10s\": dial tcp 10.128.0.9:6443: connect: connection refused" interval="1.6s" Apr 12 18:45:28.901610 kubelet[1735]: I0412 18:45:28.901578 1735 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:28.902323 kubelet[1735]: E0412 18:45:28.902290 1735 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.128.0.9:6443/api/v1/nodes\": dial tcp 10.128.0.9:6443: connect: connection refused" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:29.283446 kubelet[1735]: E0412 18:45:29.283289 1735 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.9:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.9:6443: connect: connection refused Apr 12 18:45:29.511282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3940940819.mount: Deactivated successfully. Apr 12 18:45:29.519228 env[1143]: time="2024-04-12T18:45:29.519149056Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.525349 env[1143]: time="2024-04-12T18:45:29.525277681Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.527559 env[1143]: time="2024-04-12T18:45:29.527499667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.528933 env[1143]: time="2024-04-12T18:45:29.528883451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.533864 env[1143]: time="2024-04-12T18:45:29.533716392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.535377 env[1143]: time="2024-04-12T18:45:29.535326853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.536829 env[1143]: time="2024-04-12T18:45:29.536774371Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.538885 env[1143]: time="2024-04-12T18:45:29.538827279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.540403 env[1143]: time="2024-04-12T18:45:29.540356094Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.542828 env[1143]: time="2024-04-12T18:45:29.542785649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.546156 env[1143]: time="2024-04-12T18:45:29.546098718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.547007 env[1143]: time="2024-04-12T18:45:29.546943701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:45:29.606972 env[1143]: time="2024-04-12T18:45:29.606878452Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:29.607264 env[1143]: time="2024-04-12T18:45:29.607203250Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:29.607480 env[1143]: time="2024-04-12T18:45:29.607431526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:29.609477 env[1143]: time="2024-04-12T18:45:29.609397960Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/29031d00b29dcaa7aca17586c9caab5e246205e44334d85a4a84267e59aaedca pid=1774 runtime=io.containerd.runc.v2 Apr 12 18:45:29.621618 env[1143]: time="2024-04-12T18:45:29.621512617Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:29.621618 env[1143]: time="2024-04-12T18:45:29.621570095Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:29.622392 env[1143]: time="2024-04-12T18:45:29.621992313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:29.622392 env[1143]: time="2024-04-12T18:45:29.622211654Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7b38351f7bbac8ea26f6511ea64dd711d9d34cafd301f93c81c1bf08ab21a5cf pid=1794 runtime=io.containerd.runc.v2 Apr 12 18:45:29.645422 env[1143]: time="2024-04-12T18:45:29.645278732Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:29.645422 env[1143]: time="2024-04-12T18:45:29.645372352Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:29.645855 env[1143]: time="2024-04-12T18:45:29.645390976Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:29.648839 env[1143]: time="2024-04-12T18:45:29.648635939Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40c28c6a5bd8d75359c3fd266d9e7964365530141128995f231dbd4105754518 pid=1811 runtime=io.containerd.runc.v2 Apr 12 18:45:29.658880 systemd[1]: Started cri-containerd-7b38351f7bbac8ea26f6511ea64dd711d9d34cafd301f93c81c1bf08ab21a5cf.scope. Apr 12 18:45:29.671687 systemd[1]: Started cri-containerd-29031d00b29dcaa7aca17586c9caab5e246205e44334d85a4a84267e59aaedca.scope. Apr 12 18:45:29.709269 systemd[1]: Started cri-containerd-40c28c6a5bd8d75359c3fd266d9e7964365530141128995f231dbd4105754518.scope. Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.715000 audit: BPF prog-id=70 op=LOAD Apr 12 18:45:29.717000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.717000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1774 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303331643030623239646361613761636131373538366339636161 Apr 12 18:45:29.717000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.717000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1774 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303331643030623239646361613761636131373538366339636161 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit: BPF prog-id=71 op=LOAD Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit: BPF prog-id=72 op=LOAD Apr 12 18:45:29.721000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002831d0 items=0 ppid=1774 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303331643030623239646361613761636131373538366339636161 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit: BPF prog-id=73 op=LOAD Apr 12 18:45:29.721000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000283218 items=0 ppid=1774 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303331643030623239646361613761636131373538366339636161 Apr 12 18:45:29.721000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:45:29.721000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { perfmon } for pid=1803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit[1803]: AVC avc: denied { bpf } for pid=1803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.721000 audit: BPF prog-id=74 op=LOAD Apr 12 18:45:29.721000 audit[1803]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000283628 items=0 ppid=1774 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303331643030623239646361613761636131373538366339636161 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1794 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762333833353166376262616338656132366636353131656136346464 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1794 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762333833353166376262616338656132366636353131656136346464 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.723000 audit: BPF prog-id=75 op=LOAD Apr 12 18:45:29.723000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000092b80 items=0 ppid=1794 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762333833353166376262616338656132366636353131656136346464 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit: BPF prog-id=76 op=LOAD Apr 12 18:45:29.724000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092bc8 items=0 ppid=1794 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762333833353166376262616338656132366636353131656136346464 Apr 12 18:45:29.724000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:45:29.724000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.724000 audit: BPF prog-id=77 op=LOAD Apr 12 18:45:29.724000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000092fd8 items=0 ppid=1794 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762333833353166376262616338656132366636353131656136346464 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.749000 audit: BPF prog-id=78 op=LOAD Apr 12 18:45:29.751000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.751000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1811 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633238633661356264386437353335396333666432363664396537 Apr 12 18:45:29.751000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.751000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1811 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633238633661356264386437353335396333666432363664396537 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.752000 audit: BPF prog-id=79 op=LOAD Apr 12 18:45:29.752000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001c0c80 items=0 ppid=1811 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633238633661356264386437353335396333666432363664396537 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.753000 audit: BPF prog-id=80 op=LOAD Apr 12 18:45:29.753000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001c0cc8 items=0 ppid=1811 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633238633661356264386437353335396333666432363664396537 Apr 12 18:45:29.754000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:45:29.754000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { perfmon } for pid=1847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit[1847]: AVC avc: denied { bpf } for pid=1847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.754000 audit: BPF prog-id=81 op=LOAD Apr 12 18:45:29.754000 audit[1847]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001c10d8 items=0 ppid=1811 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633238633661356264386437353335396333666432363664396537 Apr 12 18:45:29.802660 env[1143]: time="2024-04-12T18:45:29.795806198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal,Uid:74da20c0c24576daebfd222113b17909,Namespace:kube-system,Attempt:0,} returns sandbox id \"7b38351f7bbac8ea26f6511ea64dd711d9d34cafd301f93c81c1bf08ab21a5cf\"" Apr 12 18:45:29.807468 kubelet[1735]: E0412 18:45:29.807438 1735 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-21291" Apr 12 18:45:29.810573 env[1143]: time="2024-04-12T18:45:29.810523225Z" level=info msg="CreateContainer within sandbox \"7b38351f7bbac8ea26f6511ea64dd711d9d34cafd301f93c81c1bf08ab21a5cf\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:45:29.835713 env[1143]: time="2024-04-12T18:45:29.835597915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal,Uid:05c10a61b3afd54e107f15858b90b09c,Namespace:kube-system,Attempt:0,} returns sandbox id \"29031d00b29dcaa7aca17586c9caab5e246205e44334d85a4a84267e59aaedca\"" Apr 12 18:45:29.836618 env[1143]: time="2024-04-12T18:45:29.836579322Z" level=info msg="CreateContainer within sandbox \"7b38351f7bbac8ea26f6511ea64dd711d9d34cafd301f93c81c1bf08ab21a5cf\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"59c002be4de60f5de364d2d1220bdf5f0eb55abd5e4be867b009c823836ff43c\"" Apr 12 18:45:29.837815 kubelet[1735]: E0412 18:45:29.837770 1735 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-21291" Apr 12 18:45:29.838026 env[1143]: time="2024-04-12T18:45:29.837976867Z" level=info msg="StartContainer for \"59c002be4de60f5de364d2d1220bdf5f0eb55abd5e4be867b009c823836ff43c\"" Apr 12 18:45:29.841648 env[1143]: time="2024-04-12T18:45:29.841604800Z" level=info msg="CreateContainer within sandbox \"29031d00b29dcaa7aca17586c9caab5e246205e44334d85a4a84267e59aaedca\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:45:29.854203 env[1143]: time="2024-04-12T18:45:29.854139360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal,Uid:8a98eaa3f2d145ad4e57bb5d86a54a16,Namespace:kube-system,Attempt:0,} returns sandbox id \"40c28c6a5bd8d75359c3fd266d9e7964365530141128995f231dbd4105754518\"" Apr 12 18:45:29.857880 kubelet[1735]: E0412 18:45:29.857833 1735 kubelet_pods.go:417] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flat" Apr 12 18:45:29.861459 env[1143]: time="2024-04-12T18:45:29.861404325Z" level=info msg="CreateContainer within sandbox \"40c28c6a5bd8d75359c3fd266d9e7964365530141128995f231dbd4105754518\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:45:29.877026 systemd[1]: Started cri-containerd-59c002be4de60f5de364d2d1220bdf5f0eb55abd5e4be867b009c823836ff43c.scope. Apr 12 18:45:29.878177 env[1143]: time="2024-04-12T18:45:29.878004580Z" level=info msg="CreateContainer within sandbox \"29031d00b29dcaa7aca17586c9caab5e246205e44334d85a4a84267e59aaedca\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3b4658cf605a3516c561149014fb818fdd403427907ad4fc60513c0784952347\"" Apr 12 18:45:29.882195 env[1143]: time="2024-04-12T18:45:29.882147569Z" level=info msg="StartContainer for \"3b4658cf605a3516c561149014fb818fdd403427907ad4fc60513c0784952347\"" Apr 12 18:45:29.896745 env[1143]: time="2024-04-12T18:45:29.896683359Z" level=info msg="CreateContainer within sandbox \"40c28c6a5bd8d75359c3fd266d9e7964365530141128995f231dbd4105754518\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"1d4b52b310c43d652886ada4059f6564a4751b73c2939d9d1faffd744cd9c8a1\"" Apr 12 18:45:29.898580 env[1143]: time="2024-04-12T18:45:29.898543969Z" level=info msg="StartContainer for \"1d4b52b310c43d652886ada4059f6564a4751b73c2939d9d1faffd744cd9c8a1\"" Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.907000 audit: BPF prog-id=82 op=LOAD Apr 12 18:45:29.908000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.908000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1794 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633030326265346465363066356465333634643264313232306264 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1794 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633030326265346465363066356465333634643264313232306264 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.909000 audit: BPF prog-id=83 op=LOAD Apr 12 18:45:29.909000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000e1da0 items=0 ppid=1794 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633030326265346465363066356465333634643264313232306264 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.911000 audit: BPF prog-id=84 op=LOAD Apr 12 18:45:29.911000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000e1de8 items=0 ppid=1794 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633030326265346465363066356465333634643264313232306264 Apr 12 18:45:29.912000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:45:29.912000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { perfmon } for pid=1900 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit[1900]: AVC avc: denied { bpf } for pid=1900 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.912000 audit: BPF prog-id=85 op=LOAD Apr 12 18:45:29.912000 audit[1900]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00035c1f8 items=0 ppid=1794 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539633030326265346465363066356465333634643264313232306264 Apr 12 18:45:29.937440 systemd[1]: Started cri-containerd-3b4658cf605a3516c561149014fb818fdd403427907ad4fc60513c0784952347.scope. Apr 12 18:45:29.959204 systemd[1]: Started cri-containerd-1d4b52b310c43d652886ada4059f6564a4751b73c2939d9d1faffd744cd9c8a1.scope. Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.986000 audit: BPF prog-id=86 op=LOAD Apr 12 18:45:29.986000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.986000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1774 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343635386366363035613335313663353631313439303134666238 Apr 12 18:45:29.986000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.986000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1774 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343635386366363035613335313663353631313439303134666238 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit: BPF prog-id=87 op=LOAD Apr 12 18:45:29.988000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0bc0 items=0 ppid=1774 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343635386366363035613335313663353631313439303134666238 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.988000 audit: BPF prog-id=88 op=LOAD Apr 12 18:45:29.988000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0c08 items=0 ppid=1774 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343635386366363035613335313663353631313439303134666238 Apr 12 18:45:29.989000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:45:29.989000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { perfmon } for pid=1930 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit[1930]: AVC avc: denied { bpf } for pid=1930 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:29.989000 audit: BPF prog-id=89 op=LOAD Apr 12 18:45:29.989000 audit[1930]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d1018 items=0 ppid=1774 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:29.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362343635386366363035613335313663353631313439303134666238 Apr 12 18:45:30.007419 env[1143]: time="2024-04-12T18:45:30.007361898Z" level=info msg="StartContainer for \"59c002be4de60f5de364d2d1220bdf5f0eb55abd5e4be867b009c823836ff43c\" returns successfully" Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.022000 audit: BPF prog-id=90 op=LOAD Apr 12 18:45:30.023000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.023000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1811 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:30.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164346235326233313063343364363532383836616461343035396636 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1811 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:30.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164346235326233313063343364363532383836616461343035396636 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.024000 audit: BPF prog-id=91 op=LOAD Apr 12 18:45:30.024000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000251d00 items=0 ppid=1811 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:30.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164346235326233313063343364363532383836616461343035396636 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.026000 audit: BPF prog-id=92 op=LOAD Apr 12 18:45:30.026000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000251d48 items=0 ppid=1811 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:30.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164346235326233313063343364363532383836616461343035396636 Apr 12 18:45:30.029000 audit: BPF prog-id=92 op=UNLOAD Apr 12 18:45:30.029000 audit: BPF prog-id=91 op=UNLOAD Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { perfmon } for pid=1937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit[1937]: AVC avc: denied { bpf } for pid=1937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:30.029000 audit: BPF prog-id=93 op=LOAD Apr 12 18:45:30.029000 audit[1937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002be158 items=0 ppid=1811 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:30.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164346235326233313063343364363532383836616461343035396636 Apr 12 18:45:30.074970 env[1143]: time="2024-04-12T18:45:30.074813535Z" level=info msg="StartContainer for \"3b4658cf605a3516c561149014fb818fdd403427907ad4fc60513c0784952347\" returns successfully" Apr 12 18:45:30.131273 env[1143]: time="2024-04-12T18:45:30.131214027Z" level=info msg="StartContainer for \"1d4b52b310c43d652886ada4059f6564a4751b73c2939d9d1faffd744cd9c8a1\" returns successfully" Apr 12 18:45:30.509425 kubelet[1735]: I0412 18:45:30.509390 1735 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:32.956000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:32.962124 kernel: kauditd_printk_skb: 380 callbacks suppressed Apr 12 18:45:32.962247 kernel: audit: type=1400 audit(1712947532.956:726): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:32.956000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000544930 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:32.956000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:33.056526 kernel: audit: type=1300 audit(1712947532.956:726): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000544930 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:33.056708 kernel: audit: type=1327 audit(1712947532.956:726): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:33.056773 kernel: audit: type=1400 audit(1712947532.961:727): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:32.961000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:32.961000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000213300 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:33.118148 kernel: audit: type=1300 audit(1712947532.961:727): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000213300 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:33.118345 kernel: audit: type=1327 audit(1712947532.961:727): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:32.961000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:33.579000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.607329 kernel: audit: type=1400 audit(1712947533.579:728): avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.579000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006605290 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.661334 kernel: audit: type=1300 audit(1712947533.579:728): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006605290 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.579000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.610000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.744244 kernel: audit: type=1327 audit(1712947533.579:728): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.744452 kernel: audit: type=1400 audit(1712947533.610:729): avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.610000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0025bafc0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.610000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.610000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c006f1f560 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.614000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.614000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=51 a1=c006f1fb00 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.614000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.738000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.738000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0048d4580 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.738000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.739000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:33.739000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0065e4c00 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:45:33.739000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:45:33.808906 kubelet[1735]: E0412 18:45:33.808852 1735 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" not found" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:33.833696 kubelet[1735]: I0412 18:45:33.833516 1735 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:34.300150 kubelet[1735]: I0412 18:45:34.300083 1735 apiserver.go:52] "Watching apiserver" Apr 12 18:45:34.324182 kubelet[1735]: I0412 18:45:34.324132 1735 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:45:35.764446 update_engine[1135]: I0412 18:45:35.764374 1135 update_attempter.cc:509] Updating boot flags... Apr 12 18:45:36.645261 systemd[1]: Reloading. Apr 12 18:45:36.771681 /usr/lib/systemd/system-generators/torcx-generator[2038]: time="2024-04-12T18:45:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:45:36.771732 /usr/lib/systemd/system-generators/torcx-generator[2038]: time="2024-04-12T18:45:36Z" level=info msg="torcx already run" Apr 12 18:45:36.890227 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:45:36.890263 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:45:36.920624 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit: BPF prog-id=94 op=LOAD Apr 12 18:45:37.030000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.030000 audit: BPF prog-id=95 op=LOAD Apr 12 18:45:37.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.031000 audit: BPF prog-id=96 op=LOAD Apr 12 18:45:37.031000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:45:37.031000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.032000 audit: BPF prog-id=97 op=LOAD Apr 12 18:45:37.032000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.034000 audit: BPF prog-id=98 op=LOAD Apr 12 18:45:37.034000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.038000 audit: BPF prog-id=99 op=LOAD Apr 12 18:45:37.038000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.040000 audit: BPF prog-id=100 op=LOAD Apr 12 18:45:37.040000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:45:37.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.041000 audit: BPF prog-id=101 op=LOAD Apr 12 18:45:37.041000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.042000 audit: BPF prog-id=102 op=LOAD Apr 12 18:45:37.042000 audit: BPF prog-id=90 op=UNLOAD Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.043000 audit: BPF prog-id=103 op=LOAD Apr 12 18:45:37.043000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit: BPF prog-id=104 op=LOAD Apr 12 18:45:37.045000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit: BPF prog-id=105 op=LOAD Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.045000 audit: BPF prog-id=106 op=LOAD Apr 12 18:45:37.045000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:45:37.045000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.046000 audit: BPF prog-id=107 op=LOAD Apr 12 18:45:37.046000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.047000 audit: BPF prog-id=108 op=LOAD Apr 12 18:45:37.047000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.048000 audit: BPF prog-id=109 op=LOAD Apr 12 18:45:37.048000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit: BPF prog-id=110 op=LOAD Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.051000 audit: BPF prog-id=111 op=LOAD Apr 12 18:45:37.051000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:45:37.051000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit: BPF prog-id=112 op=LOAD Apr 12 18:45:37.057000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit: BPF prog-id=113 op=LOAD Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.057000 audit: BPF prog-id=114 op=LOAD Apr 12 18:45:37.057000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:45:37.057000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:45:37.082907 kubelet[1735]: I0412 18:45:37.082714 1735 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:45:37.085574 systemd[1]: Stopping kubelet.service... Apr 12 18:45:37.102763 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:45:37.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:37.103086 systemd[1]: Stopped kubelet.service. Apr 12 18:45:37.103166 systemd[1]: kubelet.service: Consumed 1.205s CPU time. Apr 12 18:45:37.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:37.105983 systemd[1]: Started kubelet.service. Apr 12 18:45:37.212388 kubelet[2082]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:45:37.212388 kubelet[2082]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:45:37.212388 kubelet[2082]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:45:37.212388 kubelet[2082]: I0412 18:45:37.211458 2082 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:45:37.225949 kubelet[2082]: I0412 18:45:37.225910 2082 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:45:37.226224 kubelet[2082]: I0412 18:45:37.226207 2082 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:45:37.226702 kubelet[2082]: I0412 18:45:37.226678 2082 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:45:37.230156 kubelet[2082]: I0412 18:45:37.230108 2082 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:45:37.232276 kubelet[2082]: I0412 18:45:37.232254 2082 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:45:37.247279 kubelet[2082]: I0412 18:45:37.247224 2082 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:45:37.247858 kubelet[2082]: I0412 18:45:37.247835 2082 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:45:37.248276 kubelet[2082]: I0412 18:45:37.248238 2082 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:45:37.248561 kubelet[2082]: I0412 18:45:37.248542 2082 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:45:37.248729 kubelet[2082]: I0412 18:45:37.248714 2082 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:45:37.248913 kubelet[2082]: I0412 18:45:37.248896 2082 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:45:37.249153 kubelet[2082]: I0412 18:45:37.249139 2082 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:45:37.250031 kubelet[2082]: I0412 18:45:37.250011 2082 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:45:37.250692 kubelet[2082]: I0412 18:45:37.250675 2082 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:45:37.253323 kubelet[2082]: I0412 18:45:37.253277 2082 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:45:37.258486 kubelet[2082]: I0412 18:45:37.258461 2082 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:45:37.289559 kubelet[2082]: I0412 18:45:37.289513 2082 server.go:1232] "Started kubelet" Apr 12 18:45:37.308898 kubelet[2082]: E0412 18:45:37.308868 2082 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:45:37.309224 kubelet[2082]: E0412 18:45:37.309184 2082 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:45:37.312000 audit[2082]: AVC avc: denied { mac_admin } for pid=2082 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.312000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:37.312000 audit[2082]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c4fce0 a1=c0008538f0 a2=c000c4fcb0 a3=25 items=0 ppid=1 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:37.312000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:37.315047 kubelet[2082]: I0412 18:45:37.315025 2082 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:45:37.313000 audit[2082]: AVC avc: denied { mac_admin } for pid=2082 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.313000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:37.313000 audit[2082]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c43860 a1=c000853908 a2=c000c4fd70 a3=25 items=0 ppid=1 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:37.313000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:37.315564 kubelet[2082]: I0412 18:45:37.315547 2082 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:45:37.315715 kubelet[2082]: I0412 18:45:37.315702 2082 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:45:37.326336 kubelet[2082]: I0412 18:45:37.322830 2082 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:45:37.326336 kubelet[2082]: I0412 18:45:37.323471 2082 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:45:37.326336 kubelet[2082]: I0412 18:45:37.323692 2082 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:45:37.327334 kubelet[2082]: I0412 18:45:37.326844 2082 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:45:37.327334 kubelet[2082]: I0412 18:45:37.327272 2082 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:45:37.327524 kubelet[2082]: I0412 18:45:37.327386 2082 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:45:37.331334 kubelet[2082]: I0412 18:45:37.328693 2082 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:45:37.360340 kubelet[2082]: I0412 18:45:37.354945 2082 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:45:37.360340 kubelet[2082]: I0412 18:45:37.356682 2082 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:45:37.360340 kubelet[2082]: I0412 18:45:37.356712 2082 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:45:37.360340 kubelet[2082]: I0412 18:45:37.356740 2082 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:45:37.360340 kubelet[2082]: E0412 18:45:37.356819 2082 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:45:37.435025 kubelet[2082]: I0412 18:45:37.434987 2082 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.457111 kubelet[2082]: E0412 18:45:37.457070 2082 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:45:37.466777 kubelet[2082]: I0412 18:45:37.466623 2082 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.466777 kubelet[2082]: I0412 18:45:37.466732 2082 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.488438 kubelet[2082]: I0412 18:45:37.488404 2082 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:45:37.488720 kubelet[2082]: I0412 18:45:37.488700 2082 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:45:37.488837 kubelet[2082]: I0412 18:45:37.488822 2082 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:45:37.489185 kubelet[2082]: I0412 18:45:37.489163 2082 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:45:37.489387 kubelet[2082]: I0412 18:45:37.489368 2082 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:45:37.489532 kubelet[2082]: I0412 18:45:37.489517 2082 policy_none.go:49] "None policy: Start" Apr 12 18:45:37.490814 kubelet[2082]: I0412 18:45:37.490790 2082 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:45:37.491276 kubelet[2082]: I0412 18:45:37.491257 2082 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:45:37.491637 kubelet[2082]: I0412 18:45:37.491619 2082 state_mem.go:75] "Updated machine memory state" Apr 12 18:45:37.501740 kubelet[2082]: I0412 18:45:37.501715 2082 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:45:37.502382 kubelet[2082]: I0412 18:45:37.502360 2082 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:45:37.500000 audit[2082]: AVC avc: denied { mac_admin } for pid=2082 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:37.500000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:45:37.500000 audit[2082]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00107fc80 a1=c00117d380 a2=c00107fc50 a3=25 items=0 ppid=1 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:37.500000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:45:37.505058 kubelet[2082]: I0412 18:45:37.505036 2082 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:45:37.660143 kubelet[2082]: I0412 18:45:37.660092 2082 topology_manager.go:215] "Topology Admit Handler" podUID="05c10a61b3afd54e107f15858b90b09c" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.660547 kubelet[2082]: I0412 18:45:37.660523 2082 topology_manager.go:215] "Topology Admit Handler" podUID="8a98eaa3f2d145ad4e57bb5d86a54a16" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.660791 kubelet[2082]: I0412 18:45:37.660771 2082 topology_manager.go:215] "Topology Admit Handler" podUID="74da20c0c24576daebfd222113b17909" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.686320 kubelet[2082]: W0412 18:45:37.686267 2082 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:45:37.686879 kubelet[2082]: W0412 18:45:37.686857 2082 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:45:37.687088 kubelet[2082]: W0412 18:45:37.687072 2082 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:45:37.725379 kubelet[2082]: I0412 18:45:37.725217 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-ca-certs\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.725778 kubelet[2082]: I0412 18:45:37.725734 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/05c10a61b3afd54e107f15858b90b09c-k8s-certs\") pod \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"05c10a61b3afd54e107f15858b90b09c\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.726054 kubelet[2082]: I0412 18:45:37.726031 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/05c10a61b3afd54e107f15858b90b09c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"05c10a61b3afd54e107f15858b90b09c\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.726279 kubelet[2082]: I0412 18:45:37.726260 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/74da20c0c24576daebfd222113b17909-kubeconfig\") pod \"kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"74da20c0c24576daebfd222113b17909\") " pod="kube-system/kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.726482 kubelet[2082]: I0412 18:45:37.726463 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/05c10a61b3afd54e107f15858b90b09c-ca-certs\") pod \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"05c10a61b3afd54e107f15858b90b09c\") " pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.726631 kubelet[2082]: I0412 18:45:37.726614 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.726769 kubelet[2082]: I0412 18:45:37.726755 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.726907 kubelet[2082]: I0412 18:45:37.726893 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:37.727050 kubelet[2082]: I0412 18:45:37.727036 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a98eaa3f2d145ad4e57bb5d86a54a16-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" (UID: \"8a98eaa3f2d145ad4e57bb5d86a54a16\") " pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:38.254389 kubelet[2082]: I0412 18:45:38.254340 2082 apiserver.go:52] "Watching apiserver" Apr 12 18:45:38.324779 kubelet[2082]: I0412 18:45:38.324702 2082 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:45:38.413346 kubelet[2082]: W0412 18:45:38.413315 2082 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters must not contain dots] Apr 12 18:45:38.413670 kubelet[2082]: E0412 18:45:38.413652 2082 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:45:38.445154 kubelet[2082]: I0412 18:45:38.445104 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" podStartSLOduration=1.44501389 podCreationTimestamp="2024-04-12 18:45:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:45:38.438530452 +0000 UTC m=+1.324389323" watchObservedRunningTime="2024-04-12 18:45:38.44501389 +0000 UTC m=+1.330872760" Apr 12 18:45:38.445739 kubelet[2082]: I0412 18:45:38.445714 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" podStartSLOduration=1.445647799 podCreationTimestamp="2024-04-12 18:45:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:45:38.428145798 +0000 UTC m=+1.314004668" watchObservedRunningTime="2024-04-12 18:45:38.445647799 +0000 UTC m=+1.331506670" Apr 12 18:45:38.473789 kubelet[2082]: I0412 18:45:38.473732 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" podStartSLOduration=1.473656707 podCreationTimestamp="2024-04-12 18:45:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:45:38.455030205 +0000 UTC m=+1.340889075" watchObservedRunningTime="2024-04-12 18:45:38.473656707 +0000 UTC m=+1.359515577" Apr 12 18:45:41.927868 sudo[1353]: pam_unix(sudo:session): session closed for user root Apr 12 18:45:41.926000 audit[1353]: USER_END pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:41.933452 kernel: kauditd_printk_skb: 272 callbacks suppressed Apr 12 18:45:41.933585 kernel: audit: type=1106 audit(1712947541.926:983): pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:41.926000 audit[1353]: CRED_DISP pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:41.983344 kernel: audit: type=1104 audit(1712947541.926:984): pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:45:41.985115 sshd[1350]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:41.987000 audit[1350]: USER_END pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:41.992950 systemd-logind[1132]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:45:41.994576 systemd[1]: sshd@6-10.128.0.9:22-139.178.89.65:35578.service: Deactivated successfully. Apr 12 18:45:41.995746 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:45:41.995971 systemd[1]: session-7.scope: Consumed 6.522s CPU time. Apr 12 18:45:41.997883 systemd-logind[1132]: Removed session 7. Apr 12 18:45:42.027632 kernel: audit: type=1106 audit(1712947541.987:985): pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:42.027822 kernel: audit: type=1104 audit(1712947541.987:986): pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:41.987000 audit[1350]: CRED_DISP pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:45:41.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.9:22-139.178.89.65:35578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:42.049347 kernel: audit: type=1131 audit(1712947541.990:987): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.9:22-139.178.89.65:35578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:49.726000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:45:49.726000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004a8f00 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:49.791833 kernel: audit: type=1400 audit(1712947549.726:988): avc: denied { watch } for pid=1965 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:45:49.792021 kernel: audit: type=1300 audit(1712947549.726:988): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004a8f00 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:49.792067 kernel: audit: type=1327 audit(1712947549.726:988): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:49.726000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.327000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.356359 kernel: audit: type=1400 audit(1712947550.327:989): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.356524 kernel: audit: type=1400 audit(1712947550.330:990): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.330000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.330000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a3f820 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:50.416698 kernel: audit: type=1300 audit(1712947550.330:990): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a3f820 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:50.416895 kernel: audit: type=1327 audit(1712947550.330:990): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.330000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.331000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.472720 kernel: audit: type=1400 audit(1712947550.331:991): avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.472916 kernel: audit: type=1300 audit(1712947550.331:991): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a3f8a0 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:50.331000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a3f8a0 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:50.331000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.535850 kernel: audit: type=1327 audit(1712947550.331:991): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.331000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:45:50.331000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a3f8e0 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:50.331000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.327000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000717020 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:45:50.327000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:45:50.823875 kubelet[2082]: I0412 18:45:50.823815 2082 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:45:50.825822 env[1143]: time="2024-04-12T18:45:50.825755533Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:45:50.826933 kubelet[2082]: I0412 18:45:50.826905 2082 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:45:51.668644 kubelet[2082]: I0412 18:45:51.668598 2082 topology_manager.go:215] "Topology Admit Handler" podUID="83049afc-f200-42cd-af7e-433c7755ae46" podNamespace="kube-system" podName="kube-proxy-mplpp" Apr 12 18:45:51.680017 systemd[1]: Created slice kubepods-besteffort-pod83049afc_f200_42cd_af7e_433c7755ae46.slice. Apr 12 18:45:51.815162 kubelet[2082]: I0412 18:45:51.815099 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dwdjx\" (UniqueName: \"kubernetes.io/projected/83049afc-f200-42cd-af7e-433c7755ae46-kube-api-access-dwdjx\") pod \"kube-proxy-mplpp\" (UID: \"83049afc-f200-42cd-af7e-433c7755ae46\") " pod="kube-system/kube-proxy-mplpp" Apr 12 18:45:51.815377 kubelet[2082]: I0412 18:45:51.815184 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/83049afc-f200-42cd-af7e-433c7755ae46-kube-proxy\") pod \"kube-proxy-mplpp\" (UID: \"83049afc-f200-42cd-af7e-433c7755ae46\") " pod="kube-system/kube-proxy-mplpp" Apr 12 18:45:51.815377 kubelet[2082]: I0412 18:45:51.815218 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/83049afc-f200-42cd-af7e-433c7755ae46-xtables-lock\") pod \"kube-proxy-mplpp\" (UID: \"83049afc-f200-42cd-af7e-433c7755ae46\") " pod="kube-system/kube-proxy-mplpp" Apr 12 18:45:51.815377 kubelet[2082]: I0412 18:45:51.815247 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/83049afc-f200-42cd-af7e-433c7755ae46-lib-modules\") pod \"kube-proxy-mplpp\" (UID: \"83049afc-f200-42cd-af7e-433c7755ae46\") " pod="kube-system/kube-proxy-mplpp" Apr 12 18:45:51.845894 kubelet[2082]: I0412 18:45:51.845835 2082 topology_manager.go:215] "Topology Admit Handler" podUID="f44e0c7a-b8b0-4a3c-92f2-a420325a3aab" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-7xgm4" Apr 12 18:45:51.854555 systemd[1]: Created slice kubepods-besteffort-podf44e0c7a_b8b0_4a3c_92f2_a420325a3aab.slice. Apr 12 18:45:51.991087 env[1143]: time="2024-04-12T18:45:51.990427699Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mplpp,Uid:83049afc-f200-42cd-af7e-433c7755ae46,Namespace:kube-system,Attempt:0,}" Apr 12 18:45:52.017425 kubelet[2082]: I0412 18:45:52.017394 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f44e0c7a-b8b0-4a3c-92f2-a420325a3aab-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-7xgm4\" (UID: \"f44e0c7a-b8b0-4a3c-92f2-a420325a3aab\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-7xgm4" Apr 12 18:45:52.017781 kubelet[2082]: I0412 18:45:52.017757 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jhjxf\" (UniqueName: \"kubernetes.io/projected/f44e0c7a-b8b0-4a3c-92f2-a420325a3aab-kube-api-access-jhjxf\") pod \"tigera-operator-6bfc79cb9c-7xgm4\" (UID: \"f44e0c7a-b8b0-4a3c-92f2-a420325a3aab\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-7xgm4" Apr 12 18:45:52.023959 env[1143]: time="2024-04-12T18:45:52.023840336Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:52.023959 env[1143]: time="2024-04-12T18:45:52.023911789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:52.023959 env[1143]: time="2024-04-12T18:45:52.023930712Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:52.024761 env[1143]: time="2024-04-12T18:45:52.024673964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f22052927977dace527b4b3f2f6d31fdd1ac39fbecc944a7e12968de8c564a56 pid=2166 runtime=io.containerd.runc.v2 Apr 12 18:45:52.054430 systemd[1]: run-containerd-runc-k8s.io-f22052927977dace527b4b3f2f6d31fdd1ac39fbecc944a7e12968de8c564a56-runc.dVeaME.mount: Deactivated successfully. Apr 12 18:45:52.065687 systemd[1]: Started cri-containerd-f22052927977dace527b4b3f2f6d31fdd1ac39fbecc944a7e12968de8c564a56.scope. Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.084000 audit: BPF prog-id=115 op=LOAD Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323035323932373937376461636535323762346233663266366433 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323035323932373937376461636535323762346233663266366433 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit: BPF prog-id=116 op=LOAD Apr 12 18:45:52.085000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003a17e0 items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323035323932373937376461636535323762346233663266366433 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.085000 audit: BPF prog-id=117 op=LOAD Apr 12 18:45:52.085000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003a1828 items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323035323932373937376461636535323762346233663266366433 Apr 12 18:45:52.086000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:45:52.086000 audit: BPF prog-id=116 op=UNLOAD Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { perfmon } for pid=2176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit[2176]: AVC avc: denied { bpf } for pid=2176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.086000 audit: BPF prog-id=118 op=LOAD Apr 12 18:45:52.086000 audit[2176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003a1c38 items=0 ppid=2166 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632323035323932373937376461636535323762346233663266366433 Apr 12 18:45:52.107457 env[1143]: time="2024-04-12T18:45:52.106897354Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mplpp,Uid:83049afc-f200-42cd-af7e-433c7755ae46,Namespace:kube-system,Attempt:0,} returns sandbox id \"f22052927977dace527b4b3f2f6d31fdd1ac39fbecc944a7e12968de8c564a56\"" Apr 12 18:45:52.113893 env[1143]: time="2024-04-12T18:45:52.113836808Z" level=info msg="CreateContainer within sandbox \"f22052927977dace527b4b3f2f6d31fdd1ac39fbecc944a7e12968de8c564a56\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:45:52.145052 env[1143]: time="2024-04-12T18:45:52.144963454Z" level=info msg="CreateContainer within sandbox \"f22052927977dace527b4b3f2f6d31fdd1ac39fbecc944a7e12968de8c564a56\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"17dff6de65e9f92e44695081369996cd059f74d5020a9f854d69d32ac7744228\"" Apr 12 18:45:52.147765 env[1143]: time="2024-04-12T18:45:52.147717706Z" level=info msg="StartContainer for \"17dff6de65e9f92e44695081369996cd059f74d5020a9f854d69d32ac7744228\"" Apr 12 18:45:52.158638 env[1143]: time="2024-04-12T18:45:52.158588645Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-7xgm4,Uid:f44e0c7a-b8b0-4a3c-92f2-a420325a3aab,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:45:52.176440 systemd[1]: Started cri-containerd-17dff6de65e9f92e44695081369996cd059f74d5020a9f854d69d32ac7744228.scope. Apr 12 18:45:52.197666 env[1143]: time="2024-04-12T18:45:52.197539256Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:52.197666 env[1143]: time="2024-04-12T18:45:52.197594860Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:52.197666 env[1143]: time="2024-04-12T18:45:52.197613620Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:52.198294 env[1143]: time="2024-04-12T18:45:52.198210268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b18978e57855df371a0519dbc837908fe898a21dc0c4e3cef89e56886376d9c1 pid=2221 runtime=io.containerd.runc.v2 Apr 12 18:45:52.225431 systemd[1]: Started cri-containerd-b18978e57855df371a0519dbc837908fe898a21dc0c4e3cef89e56886376d9c1.scope. Apr 12 18:45:52.228000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.228000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f7cb2e11128 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137646666366465363565396639326534343639353038313336393939 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.229000 audit: BPF prog-id=119 op=LOAD Apr 12 18:45:52.229000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000298be8 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137646666366465363565396639326534343639353038313336393939 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.232000 audit: BPF prog-id=120 op=LOAD Apr 12 18:45:52.232000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000298c38 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137646666366465363565396639326534343639353038313336393939 Apr 12 18:45:52.236000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:45:52.236000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.236000 audit: BPF prog-id=121 op=LOAD Apr 12 18:45:52.236000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000298cc8 items=0 ppid=2166 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137646666366465363565396639326534343639353038313336393939 Apr 12 18:45:52.277997 env[1143]: time="2024-04-12T18:45:52.277941182Z" level=info msg="StartContainer for \"17dff6de65e9f92e44695081369996cd059f74d5020a9f854d69d32ac7744228\" returns successfully" Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.294000 audit: BPF prog-id=122 op=LOAD Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2221 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383937386535373835356466333731613035313964626338333739 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2221 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383937386535373835356466333731613035313964626338333739 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit: BPF prog-id=123 op=LOAD Apr 12 18:45:52.295000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000024f00 items=0 ppid=2221 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383937386535373835356466333731613035313964626338333739 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit: BPF prog-id=124 op=LOAD Apr 12 18:45:52.295000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000024f48 items=0 ppid=2221 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383937386535373835356466333731613035313964626338333739 Apr 12 18:45:52.295000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:45:52.295000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:52.295000 audit: BPF prog-id=125 op=LOAD Apr 12 18:45:52.295000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000025358 items=0 ppid=2221 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231383937386535373835356466333731613035313964626338333739 Apr 12 18:45:52.355504 env[1143]: time="2024-04-12T18:45:52.355446564Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-7xgm4,Uid:f44e0c7a-b8b0-4a3c-92f2-a420325a3aab,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b18978e57855df371a0519dbc837908fe898a21dc0c4e3cef89e56886376d9c1\"" Apr 12 18:45:52.365581 kubelet[2082]: E0412 18:45:52.365204 2082 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Apr 12 18:45:52.366500 env[1143]: time="2024-04-12T18:45:52.366448125Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:45:52.405000 audit[2302]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.406000 audit[2301]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.406000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedff65e70 a2=0 a3=8c7d482e31f48341 items=0 ppid=2228 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:45:52.405000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9dad4130 a2=0 a3=7fff9dad411c items=0 ppid=2228 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:45:52.408000 audit[2303]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.408000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff871f12c0 a2=0 a3=7fff871f12ac items=0 ppid=2228 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.408000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:45:52.408000 audit[2304]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.408000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd25dd5400 a2=0 a3=7ffd25dd53ec items=0 ppid=2228 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.408000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:45:52.410000 audit[2305]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.410000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeeec2d310 a2=0 a3=7ffeeec2d2fc items=0 ppid=2228 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:45:52.411000 audit[2306]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.411000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe71951fe0 a2=0 a3=7ffe71951fcc items=0 ppid=2228 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:45:52.518000 audit[2307]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.518000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd97e34d60 a2=0 a3=7ffd97e34d4c items=0 ppid=2228 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.518000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:45:52.525000 audit[2309]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.525000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc71c331e0 a2=0 a3=7ffc71c331cc items=0 ppid=2228 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.525000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:45:52.532000 audit[2312]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.532000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcc3778620 a2=0 a3=7ffcc377860c items=0 ppid=2228 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.532000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:45:52.534000 audit[2313]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.534000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff998b9330 a2=0 a3=7fff998b931c items=0 ppid=2228 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.534000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:45:52.538000 audit[2315]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.538000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffddbfaa840 a2=0 a3=7ffddbfaa82c items=0 ppid=2228 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:45:52.541000 audit[2316]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.541000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcad329e20 a2=0 a3=7ffcad329e0c items=0 ppid=2228 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:45:52.547000 audit[2318]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.547000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc11387e50 a2=0 a3=7ffc11387e3c items=0 ppid=2228 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:45:52.554000 audit[2321]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.554000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd5f8fe9a0 a2=0 a3=7ffd5f8fe98c items=0 ppid=2228 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.554000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:45:52.556000 audit[2322]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.556000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1cfa10c0 a2=0 a3=7ffe1cfa10ac items=0 ppid=2228 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:45:52.560000 audit[2324]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.560000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5bb5d1c0 a2=0 a3=7fff5bb5d1ac items=0 ppid=2228 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:45:52.562000 audit[2325]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.562000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe000ce280 a2=0 a3=7ffe000ce26c items=0 ppid=2228 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:45:52.567000 audit[2327]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.567000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1195b510 a2=0 a3=7fff1195b4fc items=0 ppid=2228 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.567000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:45:52.573000 audit[2330]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.573000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd19f30b0 a2=0 a3=7fffd19f309c items=0 ppid=2228 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:45:52.581000 audit[2333]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.581000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3943d820 a2=0 a3=7ffd3943d80c items=0 ppid=2228 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:45:52.582000 audit[2334]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.582000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcab29d5d0 a2=0 a3=7ffcab29d5bc items=0 ppid=2228 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:45:52.586000 audit[2336]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.586000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc2fcdcfa0 a2=0 a3=7ffc2fcdcf8c items=0 ppid=2228 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:45:52.592000 audit[2339]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.592000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe422ed570 a2=0 a3=7ffe422ed55c items=0 ppid=2228 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.592000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:45:52.594000 audit[2340]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.594000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfcbdfab0 a2=0 a3=7ffcfcbdfa9c items=0 ppid=2228 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:45:52.597000 audit[2342]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:45:52.597000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff6afc8de0 a2=0 a3=7fff6afc8dcc items=0 ppid=2228 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:45:52.633000 audit[2348]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:52.633000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffaf539fd0 a2=0 a3=7fffaf539fbc items=0 ppid=2228 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:52.645000 audit[2348]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:52.645000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffaf539fd0 a2=0 a3=7fffaf539fbc items=0 ppid=2228 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.645000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:52.647000 audit[2353]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.647000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5b45e9b0 a2=0 a3=7fff5b45e99c items=0 ppid=2228 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.647000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:45:52.653000 audit[2355]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.653000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffecf6b2c20 a2=0 a3=7ffecf6b2c0c items=0 ppid=2228 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:45:52.660000 audit[2358]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.660000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeb8fae690 a2=0 a3=7ffeb8fae67c items=0 ppid=2228 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.660000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:45:52.662000 audit[2359]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.662000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9efc5d60 a2=0 a3=7ffd9efc5d4c items=0 ppid=2228 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.662000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:45:52.667000 audit[2361]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.667000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe081eddd0 a2=0 a3=7ffe081eddbc items=0 ppid=2228 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.667000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:45:52.670000 audit[2362]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.670000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3c2dd110 a2=0 a3=7ffe3c2dd0fc items=0 ppid=2228 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:45:52.674000 audit[2364]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.674000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3aee0e60 a2=0 a3=7fff3aee0e4c items=0 ppid=2228 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:45:52.680000 audit[2367]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.680000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffbea04c30 a2=0 a3=7fffbea04c1c items=0 ppid=2228 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:45:52.685000 audit[2368]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.685000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8e1ff440 a2=0 a3=7fff8e1ff42c items=0 ppid=2228 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:45:52.690000 audit[2370]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.690000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee5d3c240 a2=0 a3=7ffee5d3c22c items=0 ppid=2228 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:45:52.693000 audit[2371]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.693000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3d808e80 a2=0 a3=7ffe3d808e6c items=0 ppid=2228 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:45:52.698000 audit[2373]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.698000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff9a185850 a2=0 a3=7fff9a18583c items=0 ppid=2228 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.698000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:45:52.706000 audit[2376]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.706000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc81155220 a2=0 a3=7ffc8115520c items=0 ppid=2228 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:45:52.712000 audit[2379]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.712000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffddbd74580 a2=0 a3=7ffddbd7456c items=0 ppid=2228 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:45:52.714000 audit[2380]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.714000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff134fd2a0 a2=0 a3=7fff134fd28c items=0 ppid=2228 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.714000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:45:52.717000 audit[2382]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.717000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe53744300 a2=0 a3=7ffe537442ec items=0 ppid=2228 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:45:52.723000 audit[2385]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.723000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff781cca20 a2=0 a3=7fff781cca0c items=0 ppid=2228 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:45:52.724000 audit[2386]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.724000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7e75a810 a2=0 a3=7ffe7e75a7fc items=0 ppid=2228 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:45:52.729000 audit[2388]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.729000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffce339c800 a2=0 a3=7ffce339c7ec items=0 ppid=2228 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:45:52.731000 audit[2389]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.731000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff077b8de0 a2=0 a3=7fff077b8dcc items=0 ppid=2228 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:45:52.735000 audit[2391]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.735000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffe114fde0 a2=0 a3=7fffe114fdcc items=0 ppid=2228 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.735000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:45:52.740000 audit[2394]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:45:52.740000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdb19abf20 a2=0 a3=7ffdb19abf0c items=0 ppid=2228 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.740000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:45:52.744000 audit[2396]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:45:52.744000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc9310b390 a2=0 a3=7ffc9310b37c items=0 ppid=2228 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.744000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:52.745000 audit[2396]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2396 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:45:52.745000 audit[2396]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc9310b390 a2=0 a3=7ffc9310b37c items=0 ppid=2228 pid=2396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:52.745000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:56.350879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3292236934.mount: Deactivated successfully. Apr 12 18:45:57.370476 kubelet[2082]: I0412 18:45:57.370434 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mplpp" podStartSLOduration=6.370366123 podCreationTimestamp="2024-04-12 18:45:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:45:52.434283394 +0000 UTC m=+15.320142264" watchObservedRunningTime="2024-04-12 18:45:57.370366123 +0000 UTC m=+20.256224995" Apr 12 18:46:07.863844 env[1143]: time="2024-04-12T18:46:07.863754559Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:07.867750 env[1143]: time="2024-04-12T18:46:07.867692079Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:07.870751 env[1143]: time="2024-04-12T18:46:07.870700032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:07.873626 env[1143]: time="2024-04-12T18:46:07.873578565Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:07.874614 env[1143]: time="2024-04-12T18:46:07.874556379Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:46:07.885081 env[1143]: time="2024-04-12T18:46:07.885029847Z" level=info msg="CreateContainer within sandbox \"b18978e57855df371a0519dbc837908fe898a21dc0c4e3cef89e56886376d9c1\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:46:07.905108 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount717017828.mount: Deactivated successfully. Apr 12 18:46:07.914175 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3766109219.mount: Deactivated successfully. Apr 12 18:46:07.926568 env[1143]: time="2024-04-12T18:46:07.926467544Z" level=info msg="CreateContainer within sandbox \"b18978e57855df371a0519dbc837908fe898a21dc0c4e3cef89e56886376d9c1\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"833d7fc2cc657604c6f0fb8aa2886a0c6d44ae944ee344df2d257d3d1f706b6b\"" Apr 12 18:46:07.929381 env[1143]: time="2024-04-12T18:46:07.927718321Z" level=info msg="StartContainer for \"833d7fc2cc657604c6f0fb8aa2886a0c6d44ae944ee344df2d257d3d1f706b6b\"" Apr 12 18:46:07.955760 systemd[1]: Started cri-containerd-833d7fc2cc657604c6f0fb8aa2886a0c6d44ae944ee344df2d257d3d1f706b6b.scope. Apr 12 18:46:08.006404 kernel: kauditd_printk_skb: 315 callbacks suppressed Apr 12 18:46:08.006611 kernel: audit: type=1400 audit(1712947567.978:1086): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.033266 kernel: audit: type=1400 audit(1712947567.978:1087): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.079798 kernel: audit: type=1400 audit(1712947567.979:1088): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.080001 kernel: audit: type=1400 audit(1712947567.979:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.080129 kernel: audit: type=1400 audit(1712947567.979:1090): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.122572 kernel: audit: type=1400 audit(1712947567.979:1091): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.122751 kernel: audit: type=1400 audit(1712947567.979:1092): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.166889 kernel: audit: type=1400 audit(1712947567.979:1093): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:07.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.188337 kernel: audit: type=1400 audit(1712947567.979:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.189968 env[1143]: time="2024-04-12T18:46:08.189919507Z" level=info msg="StartContainer for \"833d7fc2cc657604c6f0fb8aa2886a0c6d44ae944ee344df2d257d3d1f706b6b\" returns successfully" Apr 12 18:46:08.210361 kernel: audit: type=1400 audit(1712947568.005:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.005000 audit: BPF prog-id=126 op=LOAD Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2221 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:08.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336437666332636336353736303463366630666238616132383836 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2221 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:08.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336437666332636336353736303463366630666238616132383836 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.010000 audit: BPF prog-id=127 op=LOAD Apr 12 18:46:08.010000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b0f70 items=0 ppid=2221 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:08.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336437666332636336353736303463366630666238616132383836 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit: BPF prog-id=128 op=LOAD Apr 12 18:46:08.034000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b0fb8 items=0 ppid=2221 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336437666332636336353736303463366630666238616132383836 Apr 12 18:46:08.034000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:46:08.034000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { perfmon } for pid=2404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit[2404]: AVC avc: denied { bpf } for pid=2404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:08.034000 audit: BPF prog-id=129 op=LOAD Apr 12 18:46:08.034000 audit[2404]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b13c8 items=0 ppid=2221 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:08.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833336437666332636336353736303463366630666238616132383836 Apr 12 18:46:10.155000 audit[2437]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:10.155000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe00b99600 a2=0 a3=7ffe00b995ec items=0 ppid=2228 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.155000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:10.156000 audit[2437]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:10.156000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe00b99600 a2=0 a3=0 items=0 ppid=2228 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:10.165000 audit[2439]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:10.165000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff65cfb8b0 a2=0 a3=7fff65cfb89c items=0 ppid=2228 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:10.167000 audit[2439]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:10.167000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff65cfb8b0 a2=0 a3=0 items=0 ppid=2228 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.167000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:10.290561 kubelet[2082]: I0412 18:46:10.290511 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-7xgm4" podStartSLOduration=3.775501866 podCreationTimestamp="2024-04-12 18:45:51 +0000 UTC" firstStartedPulling="2024-04-12 18:45:52.360187024 +0000 UTC m=+15.246045868" lastFinishedPulling="2024-04-12 18:46:07.875139049 +0000 UTC m=+30.760997904" observedRunningTime="2024-04-12 18:46:08.465080799 +0000 UTC m=+31.350939670" watchObservedRunningTime="2024-04-12 18:46:10.290453902 +0000 UTC m=+33.176312776" Apr 12 18:46:10.291233 kubelet[2082]: I0412 18:46:10.290891 2082 topology_manager.go:215] "Topology Admit Handler" podUID="172a9f1f-6a51-48c0-a33a-2fe240e358f0" podNamespace="calico-system" podName="calico-typha-67f4bfd6db-kqbwr" Apr 12 18:46:10.299383 systemd[1]: Created slice kubepods-besteffort-pod172a9f1f_6a51_48c0_a33a_2fe240e358f0.slice. Apr 12 18:46:10.349846 kubelet[2082]: I0412 18:46:10.349788 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-992bw\" (UniqueName: \"kubernetes.io/projected/172a9f1f-6a51-48c0-a33a-2fe240e358f0-kube-api-access-992bw\") pod \"calico-typha-67f4bfd6db-kqbwr\" (UID: \"172a9f1f-6a51-48c0-a33a-2fe240e358f0\") " pod="calico-system/calico-typha-67f4bfd6db-kqbwr" Apr 12 18:46:10.349846 kubelet[2082]: I0412 18:46:10.349854 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/172a9f1f-6a51-48c0-a33a-2fe240e358f0-tigera-ca-bundle\") pod \"calico-typha-67f4bfd6db-kqbwr\" (UID: \"172a9f1f-6a51-48c0-a33a-2fe240e358f0\") " pod="calico-system/calico-typha-67f4bfd6db-kqbwr" Apr 12 18:46:10.350136 kubelet[2082]: I0412 18:46:10.349887 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/172a9f1f-6a51-48c0-a33a-2fe240e358f0-typha-certs\") pod \"calico-typha-67f4bfd6db-kqbwr\" (UID: \"172a9f1f-6a51-48c0-a33a-2fe240e358f0\") " pod="calico-system/calico-typha-67f4bfd6db-kqbwr" Apr 12 18:46:10.395001 kubelet[2082]: I0412 18:46:10.394955 2082 topology_manager.go:215] "Topology Admit Handler" podUID="811c8366-2b88-4b65-bc04-7b622fb35ac3" podNamespace="calico-system" podName="calico-node-dj6vt" Apr 12 18:46:10.402686 systemd[1]: Created slice kubepods-besteffort-pod811c8366_2b88_4b65_bc04_7b622fb35ac3.slice. Apr 12 18:46:10.513729 kubelet[2082]: I0412 18:46:10.513578 2082 topology_manager.go:215] "Topology Admit Handler" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" podNamespace="calico-system" podName="csi-node-driver-v7dqp" Apr 12 18:46:10.514913 kubelet[2082]: E0412 18:46:10.513930 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:10.550774 kubelet[2082]: I0412 18:46:10.550732 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4frvk\" (UniqueName: \"kubernetes.io/projected/811c8366-2b88-4b65-bc04-7b622fb35ac3-kube-api-access-4frvk\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.550986 kubelet[2082]: I0412 18:46:10.550808 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-var-run-calico\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.550986 kubelet[2082]: I0412 18:46:10.550850 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-lib-modules\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.550986 kubelet[2082]: I0412 18:46:10.550902 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-var-lib-calico\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.550986 kubelet[2082]: I0412 18:46:10.550950 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-policysync\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.550986 kubelet[2082]: I0412 18:46:10.550982 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/811c8366-2b88-4b65-bc04-7b622fb35ac3-tigera-ca-bundle\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.551320 kubelet[2082]: I0412 18:46:10.551017 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-cni-bin-dir\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.551320 kubelet[2082]: I0412 18:46:10.551070 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-cni-net-dir\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.551320 kubelet[2082]: I0412 18:46:10.551124 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-xtables-lock\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.551320 kubelet[2082]: I0412 18:46:10.551162 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-flexvol-driver-host\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.551320 kubelet[2082]: I0412 18:46:10.551218 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/811c8366-2b88-4b65-bc04-7b622fb35ac3-node-certs\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.551592 kubelet[2082]: I0412 18:46:10.551313 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/811c8366-2b88-4b65-bc04-7b622fb35ac3-cni-log-dir\") pod \"calico-node-dj6vt\" (UID: \"811c8366-2b88-4b65-bc04-7b622fb35ac3\") " pod="calico-system/calico-node-dj6vt" Apr 12 18:46:10.607786 env[1143]: time="2024-04-12T18:46:10.607097806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-67f4bfd6db-kqbwr,Uid:172a9f1f-6a51-48c0-a33a-2fe240e358f0,Namespace:calico-system,Attempt:0,}" Apr 12 18:46:10.638393 env[1143]: time="2024-04-12T18:46:10.638318606Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:10.638673 env[1143]: time="2024-04-12T18:46:10.638638142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:10.638812 env[1143]: time="2024-04-12T18:46:10.638783321Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:10.639153 env[1143]: time="2024-04-12T18:46:10.639115004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb06562f376bfbd453c98b32b13264afecc0c6b14362e05ee2aafbef7cf40886 pid=2449 runtime=io.containerd.runc.v2 Apr 12 18:46:10.654177 kubelet[2082]: I0412 18:46:10.651911 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/eb8b1a80-44e3-4847-af88-1b94ddb35dc1-varrun\") pod \"csi-node-driver-v7dqp\" (UID: \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\") " pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:10.654177 kubelet[2082]: I0412 18:46:10.651994 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/eb8b1a80-44e3-4847-af88-1b94ddb35dc1-kubelet-dir\") pod \"csi-node-driver-v7dqp\" (UID: \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\") " pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:10.654177 kubelet[2082]: I0412 18:46:10.652029 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/eb8b1a80-44e3-4847-af88-1b94ddb35dc1-socket-dir\") pod \"csi-node-driver-v7dqp\" (UID: \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\") " pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:10.654177 kubelet[2082]: I0412 18:46:10.652174 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-97vz7\" (UniqueName: \"kubernetes.io/projected/eb8b1a80-44e3-4847-af88-1b94ddb35dc1-kube-api-access-97vz7\") pod \"csi-node-driver-v7dqp\" (UID: \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\") " pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:10.654177 kubelet[2082]: I0412 18:46:10.652210 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/eb8b1a80-44e3-4847-af88-1b94ddb35dc1-registration-dir\") pod \"csi-node-driver-v7dqp\" (UID: \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\") " pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:10.656355 kubelet[2082]: E0412 18:46:10.656327 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.656550 kubelet[2082]: W0412 18:46:10.656526 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.656696 kubelet[2082]: E0412 18:46:10.656679 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.657078 kubelet[2082]: E0412 18:46:10.657060 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.657205 kubelet[2082]: W0412 18:46:10.657186 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.657389 kubelet[2082]: E0412 18:46:10.657369 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.657817 kubelet[2082]: E0412 18:46:10.657798 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.657947 kubelet[2082]: W0412 18:46:10.657927 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.658073 kubelet[2082]: E0412 18:46:10.658056 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.658647 kubelet[2082]: E0412 18:46:10.658630 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.658786 kubelet[2082]: W0412 18:46:10.658768 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.659048 kubelet[2082]: E0412 18:46:10.659030 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.665949 kubelet[2082]: E0412 18:46:10.665926 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.666131 kubelet[2082]: W0412 18:46:10.666110 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.666425 kubelet[2082]: E0412 18:46:10.666407 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.666785 kubelet[2082]: E0412 18:46:10.666768 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.672290 kubelet[2082]: W0412 18:46:10.672264 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.672682 kubelet[2082]: E0412 18:46:10.672660 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.673063 kubelet[2082]: E0412 18:46:10.673044 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.673207 kubelet[2082]: W0412 18:46:10.673187 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.673464 kubelet[2082]: E0412 18:46:10.673446 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.673835 kubelet[2082]: E0412 18:46:10.673818 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.673977 kubelet[2082]: W0412 18:46:10.673958 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.674216 kubelet[2082]: E0412 18:46:10.674199 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.674582 kubelet[2082]: E0412 18:46:10.674565 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.674726 kubelet[2082]: W0412 18:46:10.674707 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.674977 kubelet[2082]: E0412 18:46:10.674960 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.675749 kubelet[2082]: E0412 18:46:10.675731 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.675886 kubelet[2082]: W0412 18:46:10.675869 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.676106 kubelet[2082]: E0412 18:46:10.676091 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.676425 kubelet[2082]: E0412 18:46:10.676408 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.676555 kubelet[2082]: W0412 18:46:10.676539 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.676672 kubelet[2082]: E0412 18:46:10.676657 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.677034 kubelet[2082]: E0412 18:46:10.677019 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.677150 kubelet[2082]: W0412 18:46:10.677134 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.677262 kubelet[2082]: E0412 18:46:10.677248 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.677713 kubelet[2082]: E0412 18:46:10.677697 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.678784 kubelet[2082]: W0412 18:46:10.678765 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.681150 kubelet[2082]: E0412 18:46:10.681118 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.714013 systemd[1]: Started cri-containerd-fb06562f376bfbd453c98b32b13264afecc0c6b14362e05ee2aafbef7cf40886.scope. Apr 12 18:46:10.718861 kubelet[2082]: E0412 18:46:10.717725 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.719043 kubelet[2082]: W0412 18:46:10.718864 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.719043 kubelet[2082]: E0412 18:46:10.718897 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.736000 audit: BPF prog-id=130 op=LOAD Apr 12 18:46:10.738000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.738000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2449 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303635363266333736626662643435336339386233326231333236 Apr 12 18:46:10.738000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.738000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2449 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.738000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303635363266333736626662643435336339386233326231333236 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.739000 audit: BPF prog-id=131 op=LOAD Apr 12 18:46:10.739000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000392870 items=0 ppid=2449 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303635363266333736626662643435336339386233326231333236 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.740000 audit: BPF prog-id=132 op=LOAD Apr 12 18:46:10.740000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003928b8 items=0 ppid=2449 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303635363266333736626662643435336339386233326231333236 Apr 12 18:46:10.741000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:46:10.741000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:10.741000 audit: BPF prog-id=133 op=LOAD Apr 12 18:46:10.741000 audit[2457]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000392cc8 items=0 ppid=2449 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:10.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662303635363266333736626662643435336339386233326231333236 Apr 12 18:46:10.754466 kubelet[2082]: E0412 18:46:10.754437 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.754466 kubelet[2082]: W0412 18:46:10.754464 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.754695 kubelet[2082]: E0412 18:46:10.754498 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.754916 kubelet[2082]: E0412 18:46:10.754890 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.755024 kubelet[2082]: W0412 18:46:10.754919 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.755024 kubelet[2082]: E0412 18:46:10.754946 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.755329 kubelet[2082]: E0412 18:46:10.755294 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.755329 kubelet[2082]: W0412 18:46:10.755327 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.755499 kubelet[2082]: E0412 18:46:10.755352 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.755707 kubelet[2082]: E0412 18:46:10.755685 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.755707 kubelet[2082]: W0412 18:46:10.755705 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.755866 kubelet[2082]: E0412 18:46:10.755728 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.756059 kubelet[2082]: E0412 18:46:10.756039 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.756059 kubelet[2082]: W0412 18:46:10.756054 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.756314 kubelet[2082]: E0412 18:46:10.756217 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.756424 kubelet[2082]: E0412 18:46:10.756405 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.756424 kubelet[2082]: W0412 18:46:10.756422 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.756651 kubelet[2082]: E0412 18:46:10.756609 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.756733 kubelet[2082]: E0412 18:46:10.756722 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.756795 kubelet[2082]: W0412 18:46:10.756734 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.756920 kubelet[2082]: E0412 18:46:10.756879 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.757055 kubelet[2082]: E0412 18:46:10.757037 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.757055 kubelet[2082]: W0412 18:46:10.757053 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.757279 kubelet[2082]: E0412 18:46:10.757241 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.757398 kubelet[2082]: E0412 18:46:10.757374 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.757503 kubelet[2082]: W0412 18:46:10.757404 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.757655 kubelet[2082]: E0412 18:46:10.757609 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.757731 kubelet[2082]: E0412 18:46:10.757703 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.757731 kubelet[2082]: W0412 18:46:10.757714 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.757915 kubelet[2082]: E0412 18:46:10.757880 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.758015 kubelet[2082]: E0412 18:46:10.757996 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.758015 kubelet[2082]: W0412 18:46:10.758013 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.758203 kubelet[2082]: E0412 18:46:10.758167 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.758915 kubelet[2082]: E0412 18:46:10.758891 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.758915 kubelet[2082]: W0412 18:46:10.758912 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.759148 kubelet[2082]: E0412 18:46:10.759118 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.760120 kubelet[2082]: E0412 18:46:10.760096 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.760120 kubelet[2082]: W0412 18:46:10.760116 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.760496 kubelet[2082]: E0412 18:46:10.760289 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.760654 kubelet[2082]: E0412 18:46:10.760635 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.760654 kubelet[2082]: W0412 18:46:10.760654 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.766482 kubelet[2082]: E0412 18:46:10.766369 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.766482 kubelet[2082]: E0412 18:46:10.766463 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.766482 kubelet[2082]: W0412 18:46:10.766474 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.766714 kubelet[2082]: E0412 18:46:10.766605 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.769982 kubelet[2082]: E0412 18:46:10.766851 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.769982 kubelet[2082]: W0412 18:46:10.766864 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.769982 kubelet[2082]: E0412 18:46:10.769806 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.770789 kubelet[2082]: E0412 18:46:10.770401 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.770789 kubelet[2082]: W0412 18:46:10.770427 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.770789 kubelet[2082]: E0412 18:46:10.770570 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.771018 kubelet[2082]: E0412 18:46:10.770818 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.771018 kubelet[2082]: W0412 18:46:10.770830 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.771018 kubelet[2082]: E0412 18:46:10.770948 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.771795 kubelet[2082]: E0412 18:46:10.771318 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.771795 kubelet[2082]: W0412 18:46:10.771334 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.771795 kubelet[2082]: E0412 18:46:10.771450 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.771795 kubelet[2082]: E0412 18:46:10.771658 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.771795 kubelet[2082]: W0412 18:46:10.771669 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.772119 kubelet[2082]: E0412 18:46:10.771815 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.772119 kubelet[2082]: E0412 18:46:10.772039 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.772119 kubelet[2082]: W0412 18:46:10.772050 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.772273 kubelet[2082]: E0412 18:46:10.772203 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.773382 kubelet[2082]: E0412 18:46:10.773359 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.773382 kubelet[2082]: W0412 18:46:10.773379 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.773545 kubelet[2082]: E0412 18:46:10.773528 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.773794 kubelet[2082]: E0412 18:46:10.773772 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.773794 kubelet[2082]: W0412 18:46:10.773793 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.773943 kubelet[2082]: E0412 18:46:10.773933 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.774189 kubelet[2082]: E0412 18:46:10.774133 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.774189 kubelet[2082]: W0412 18:46:10.774147 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.774366 kubelet[2082]: E0412 18:46:10.774312 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.776736 kubelet[2082]: E0412 18:46:10.776710 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.776736 kubelet[2082]: W0412 18:46:10.776732 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.776931 kubelet[2082]: E0412 18:46:10.776753 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.808562 kubelet[2082]: E0412 18:46:10.808434 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:10.808562 kubelet[2082]: W0412 18:46:10.808456 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:10.808562 kubelet[2082]: E0412 18:46:10.808485 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:10.809790 env[1143]: time="2024-04-12T18:46:10.809741678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-67f4bfd6db-kqbwr,Uid:172a9f1f-6a51-48c0-a33a-2fe240e358f0,Namespace:calico-system,Attempt:0,} returns sandbox id \"fb06562f376bfbd453c98b32b13264afecc0c6b14362e05ee2aafbef7cf40886\"" Apr 12 18:46:10.816599 env[1143]: time="2024-04-12T18:46:10.816551684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:46:11.007512 env[1143]: time="2024-04-12T18:46:11.007457479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dj6vt,Uid:811c8366-2b88-4b65-bc04-7b622fb35ac3,Namespace:calico-system,Attempt:0,}" Apr 12 18:46:11.039918 env[1143]: time="2024-04-12T18:46:11.039174569Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:11.040695 env[1143]: time="2024-04-12T18:46:11.040066532Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:11.040695 env[1143]: time="2024-04-12T18:46:11.040136775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:11.040695 env[1143]: time="2024-04-12T18:46:11.040378157Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662 pid=2535 runtime=io.containerd.runc.v2 Apr 12 18:46:11.062170 systemd[1]: Started cri-containerd-c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662.scope. Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.097000 audit: BPF prog-id=134 op=LOAD Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2535 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613836613739373039303732313138633034663761353063626366 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2535 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613836613739373039303732313138633034663761353063626366 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit: BPF prog-id=135 op=LOAD Apr 12 18:46:11.098000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000378750 items=0 ppid=2535 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613836613739373039303732313138633034663761353063626366 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit: BPF prog-id=136 op=LOAD Apr 12 18:46:11.098000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000378798 items=0 ppid=2535 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613836613739373039303732313138633034663761353063626366 Apr 12 18:46:11.098000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:46:11.098000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { perfmon } for pid=2544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit[2544]: AVC avc: denied { bpf } for pid=2544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:11.098000 audit: BPF prog-id=137 op=LOAD Apr 12 18:46:11.098000 audit[2544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000378ba8 items=0 ppid=2535 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613836613739373039303732313138633034663761353063626366 Apr 12 18:46:11.124352 env[1143]: time="2024-04-12T18:46:11.124246698Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-dj6vt,Uid:811c8366-2b88-4b65-bc04-7b622fb35ac3,Namespace:calico-system,Attempt:0,} returns sandbox id \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\"" Apr 12 18:46:11.180000 audit[2569]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:11.180000 audit[2569]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffda5966d30 a2=0 a3=7ffda5966d1c items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.180000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:11.181000 audit[2569]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2569 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:11.181000 audit[2569]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffda5966d30 a2=0 a3=0 items=0 ppid=2228 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:11.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:11.763399 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3675216634.mount: Deactivated successfully. Apr 12 18:46:12.357842 kubelet[2082]: E0412 18:46:12.357796 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:13.591027 env[1143]: time="2024-04-12T18:46:13.590953067Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:13.598233 env[1143]: time="2024-04-12T18:46:13.598178937Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:13.600838 env[1143]: time="2024-04-12T18:46:13.600800645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:13.603630 env[1143]: time="2024-04-12T18:46:13.603594593Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:13.605253 env[1143]: time="2024-04-12T18:46:13.605200985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:46:13.608036 env[1143]: time="2024-04-12T18:46:13.607992061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:46:13.632603 env[1143]: time="2024-04-12T18:46:13.632549787Z" level=info msg="CreateContainer within sandbox \"fb06562f376bfbd453c98b32b13264afecc0c6b14362e05ee2aafbef7cf40886\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:46:13.651991 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount617622590.mount: Deactivated successfully. Apr 12 18:46:13.662150 env[1143]: time="2024-04-12T18:46:13.662100970Z" level=info msg="CreateContainer within sandbox \"fb06562f376bfbd453c98b32b13264afecc0c6b14362e05ee2aafbef7cf40886\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3b3e1e471654dea8b62a545b63b35c0f112391c1adbb13aa8c2561832c17375d\"" Apr 12 18:46:13.663066 env[1143]: time="2024-04-12T18:46:13.663029845Z" level=info msg="StartContainer for \"3b3e1e471654dea8b62a545b63b35c0f112391c1adbb13aa8c2561832c17375d\"" Apr 12 18:46:13.700949 systemd[1]: Started cri-containerd-3b3e1e471654dea8b62a545b63b35c0f112391c1adbb13aa8c2561832c17375d.scope. Apr 12 18:46:13.735958 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:46:13.736170 kernel: audit: type=1400 audit(1712947573.728:1146): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.767376 kernel: audit: type=1400 audit(1712947573.728:1147): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.808338 kernel: audit: type=1400 audit(1712947573.728:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.832566 kernel: audit: type=1400 audit(1712947573.728:1149): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.855335 kernel: audit: type=1400 audit(1712947573.728:1150): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.855506 kernel: audit: type=1400 audit(1712947573.728:1151): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.878949 env[1143]: time="2024-04-12T18:46:13.878890154Z" level=info msg="StartContainer for \"3b3e1e471654dea8b62a545b63b35c0f112391c1adbb13aa8c2561832c17375d\" returns successfully" Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.904423 kernel: audit: type=1400 audit(1712947573.728:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.949792 kernel: audit: type=1400 audit(1712947573.728:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.949951 kernel: audit: type=1400 audit(1712947573.728:1154): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.971227 kernel: audit: type=1400 audit(1712947573.728:1155): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.728000 audit: BPF prog-id=138 op=LOAD Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2449 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:13.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362336531653437313635346465613862363261353435623633623335 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2449 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:13.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362336531653437313635346465613862363261353435623633623335 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.740000 audit: BPF prog-id=139 op=LOAD Apr 12 18:46:13.740000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000218380 items=0 ppid=2449 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:13.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362336531653437313635346465613862363261353435623633623335 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit: BPF prog-id=140 op=LOAD Apr 12 18:46:13.776000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002183c8 items=0 ppid=2449 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:13.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362336531653437313635346465613862363261353435623633623335 Apr 12 18:46:13.776000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:46:13.776000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { perfmon } for pid=2580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit[2580]: AVC avc: denied { bpf } for pid=2580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:13.776000 audit: BPF prog-id=141 op=LOAD Apr 12 18:46:13.776000 audit[2580]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002187d8 items=0 ppid=2449 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:13.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362336531653437313635346465613862363261353435623633623335 Apr 12 18:46:14.357122 kubelet[2082]: E0412 18:46:14.357073 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:14.485542 kubelet[2082]: E0412 18:46:14.485498 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.485844 kubelet[2082]: W0412 18:46:14.485822 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.485993 kubelet[2082]: E0412 18:46:14.485978 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.486561 kubelet[2082]: E0412 18:46:14.486541 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.486727 kubelet[2082]: W0412 18:46:14.486700 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.486895 kubelet[2082]: E0412 18:46:14.486879 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.487389 kubelet[2082]: E0412 18:46:14.487371 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.487819 kubelet[2082]: W0412 18:46:14.487788 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.487982 kubelet[2082]: E0412 18:46:14.487966 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.488482 kubelet[2082]: E0412 18:46:14.488455 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.488616 kubelet[2082]: W0412 18:46:14.488598 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.488752 kubelet[2082]: E0412 18:46:14.488738 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.489233 kubelet[2082]: E0412 18:46:14.489216 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.489418 kubelet[2082]: W0412 18:46:14.489399 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.489561 kubelet[2082]: E0412 18:46:14.489546 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.491020 kubelet[2082]: E0412 18:46:14.491002 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.491189 kubelet[2082]: W0412 18:46:14.491168 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.491590 kubelet[2082]: E0412 18:46:14.491557 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.492069 kubelet[2082]: E0412 18:46:14.492051 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.492213 kubelet[2082]: W0412 18:46:14.492195 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.492386 kubelet[2082]: E0412 18:46:14.492371 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.493171 kubelet[2082]: E0412 18:46:14.493154 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.493335 kubelet[2082]: W0412 18:46:14.493316 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.493523 kubelet[2082]: E0412 18:46:14.493507 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.499186 kubelet[2082]: E0412 18:46:14.499160 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.500287 kubelet[2082]: W0412 18:46:14.500256 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.500483 kubelet[2082]: E0412 18:46:14.500465 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.500953 kubelet[2082]: E0412 18:46:14.500938 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.501077 kubelet[2082]: W0412 18:46:14.501059 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.501193 kubelet[2082]: E0412 18:46:14.501178 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.501604 kubelet[2082]: E0412 18:46:14.501586 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.501768 kubelet[2082]: W0412 18:46:14.501751 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.501886 kubelet[2082]: E0412 18:46:14.501871 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.502270 kubelet[2082]: E0412 18:46:14.502253 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.502423 kubelet[2082]: W0412 18:46:14.502405 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.502548 kubelet[2082]: E0412 18:46:14.502534 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.503158 kubelet[2082]: E0412 18:46:14.503140 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.503534 kubelet[2082]: W0412 18:46:14.503511 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.503688 kubelet[2082]: E0412 18:46:14.503673 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.504062 kubelet[2082]: E0412 18:46:14.504046 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.504180 kubelet[2082]: W0412 18:46:14.504163 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.504321 kubelet[2082]: E0412 18:46:14.504285 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.504803 kubelet[2082]: E0412 18:46:14.504785 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.504924 kubelet[2082]: W0412 18:46:14.504907 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.505037 kubelet[2082]: E0412 18:46:14.505023 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.507144 kubelet[2082]: E0412 18:46:14.507125 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.507276 kubelet[2082]: W0412 18:46:14.507259 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.507482 kubelet[2082]: E0412 18:46:14.507464 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.508028 kubelet[2082]: E0412 18:46:14.508010 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.508159 kubelet[2082]: W0412 18:46:14.508140 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.508331 kubelet[2082]: E0412 18:46:14.508295 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.509012 kubelet[2082]: E0412 18:46:14.508995 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.509137 kubelet[2082]: W0412 18:46:14.509121 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.509260 kubelet[2082]: E0412 18:46:14.509247 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.509706 kubelet[2082]: E0412 18:46:14.509690 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.509845 kubelet[2082]: W0412 18:46:14.509827 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.509973 kubelet[2082]: E0412 18:46:14.509958 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.510442 kubelet[2082]: E0412 18:46:14.510424 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.510573 kubelet[2082]: W0412 18:46:14.510553 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.510731 kubelet[2082]: E0412 18:46:14.510712 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.513195 kubelet[2082]: I0412 18:46:14.513166 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-67f4bfd6db-kqbwr" podStartSLOduration=1.717501666 podCreationTimestamp="2024-04-12 18:46:10 +0000 UTC" firstStartedPulling="2024-04-12 18:46:10.811440222 +0000 UTC m=+33.697299076" lastFinishedPulling="2024-04-12 18:46:13.607060636 +0000 UTC m=+36.492919501" observedRunningTime="2024-04-12 18:46:14.496846655 +0000 UTC m=+37.382705529" watchObservedRunningTime="2024-04-12 18:46:14.513122091 +0000 UTC m=+37.398980962" Apr 12 18:46:14.514088 kubelet[2082]: E0412 18:46:14.514068 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.514222 kubelet[2082]: W0412 18:46:14.514202 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.514447 kubelet[2082]: E0412 18:46:14.514428 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.514968 kubelet[2082]: E0412 18:46:14.514949 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.515121 kubelet[2082]: W0412 18:46:14.515101 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.515418 kubelet[2082]: E0412 18:46:14.515399 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.515886 kubelet[2082]: E0412 18:46:14.515868 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.516013 kubelet[2082]: W0412 18:46:14.515993 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.516127 kubelet[2082]: E0412 18:46:14.516113 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.516540 kubelet[2082]: E0412 18:46:14.516523 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.516696 kubelet[2082]: W0412 18:46:14.516676 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.516811 kubelet[2082]: E0412 18:46:14.516797 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.517240 kubelet[2082]: E0412 18:46:14.517223 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.517408 kubelet[2082]: W0412 18:46:14.517371 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.517557 kubelet[2082]: E0412 18:46:14.517542 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.517994 kubelet[2082]: E0412 18:46:14.517976 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.518140 kubelet[2082]: W0412 18:46:14.518120 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.518268 kubelet[2082]: E0412 18:46:14.518254 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.518743 kubelet[2082]: E0412 18:46:14.518725 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.518871 kubelet[2082]: W0412 18:46:14.518852 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.518991 kubelet[2082]: E0412 18:46:14.518976 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.519644 kubelet[2082]: E0412 18:46:14.519627 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.519795 kubelet[2082]: W0412 18:46:14.519775 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.519928 kubelet[2082]: E0412 18:46:14.519913 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.520395 kubelet[2082]: E0412 18:46:14.520376 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.520519 kubelet[2082]: W0412 18:46:14.520501 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.520660 kubelet[2082]: E0412 18:46:14.520644 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.521727 kubelet[2082]: E0412 18:46:14.521709 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.521954 kubelet[2082]: W0412 18:46:14.521933 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.522107 kubelet[2082]: E0412 18:46:14.522090 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.522603 kubelet[2082]: E0412 18:46:14.522586 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.522756 kubelet[2082]: W0412 18:46:14.522736 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.522886 kubelet[2082]: E0412 18:46:14.522871 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.523800 kubelet[2082]: E0412 18:46:14.523783 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.524087 kubelet[2082]: W0412 18:46:14.524067 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.524245 kubelet[2082]: E0412 18:46:14.524228 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.524693 kubelet[2082]: E0412 18:46:14.524677 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:14.524831 kubelet[2082]: W0412 18:46:14.524814 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:14.524947 kubelet[2082]: E0412 18:46:14.524933 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:14.564000 audit[2645]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:14.564000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffe4ab3270 a2=0 a3=7fffe4ab325c items=0 ppid=2228 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:14.564000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:14.565000 audit[2645]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2645 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:14.565000 audit[2645]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffe4ab3270 a2=0 a3=7fffe4ab325c items=0 ppid=2228 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:14.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:15.430345 env[1143]: time="2024-04-12T18:46:15.429437633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:15.434163 env[1143]: time="2024-04-12T18:46:15.434107623Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:15.440463 env[1143]: time="2024-04-12T18:46:15.440413121Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:15.443390 env[1143]: time="2024-04-12T18:46:15.443343289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:15.444691 env[1143]: time="2024-04-12T18:46:15.444636076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:46:15.449820 env[1143]: time="2024-04-12T18:46:15.449784442Z" level=info msg="CreateContainer within sandbox \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:46:15.469224 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1778389719.mount: Deactivated successfully. Apr 12 18:46:15.485698 env[1143]: time="2024-04-12T18:46:15.485638044Z" level=info msg="CreateContainer within sandbox \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096\"" Apr 12 18:46:15.486484 env[1143]: time="2024-04-12T18:46:15.486433863Z" level=info msg="StartContainer for \"c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096\"" Apr 12 18:46:15.512021 kubelet[2082]: E0412 18:46:15.511791 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.512021 kubelet[2082]: W0412 18:46:15.511816 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.512021 kubelet[2082]: E0412 18:46:15.511846 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.513714 kubelet[2082]: E0412 18:46:15.512834 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.513714 kubelet[2082]: W0412 18:46:15.512852 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.513714 kubelet[2082]: E0412 18:46:15.512881 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.513714 kubelet[2082]: E0412 18:46:15.513189 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.513714 kubelet[2082]: W0412 18:46:15.513202 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.513714 kubelet[2082]: E0412 18:46:15.513223 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.513714 kubelet[2082]: E0412 18:46:15.513545 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.513714 kubelet[2082]: W0412 18:46:15.513561 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.513714 kubelet[2082]: E0412 18:46:15.513581 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.514817 kubelet[2082]: E0412 18:46:15.514366 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.514817 kubelet[2082]: W0412 18:46:15.514381 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.514817 kubelet[2082]: E0412 18:46:15.514402 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.514817 kubelet[2082]: E0412 18:46:15.514681 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.514817 kubelet[2082]: W0412 18:46:15.514693 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.514817 kubelet[2082]: E0412 18:46:15.514711 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.515560 kubelet[2082]: E0412 18:46:15.515349 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.515560 kubelet[2082]: W0412 18:46:15.515364 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.515560 kubelet[2082]: E0412 18:46:15.515384 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.516036 kubelet[2082]: E0412 18:46:15.515845 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.516036 kubelet[2082]: W0412 18:46:15.515861 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.516036 kubelet[2082]: E0412 18:46:15.515880 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.516475 kubelet[2082]: E0412 18:46:15.516294 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.516475 kubelet[2082]: W0412 18:46:15.516338 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.516475 kubelet[2082]: E0412 18:46:15.516364 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.516869 kubelet[2082]: E0412 18:46:15.516731 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.516869 kubelet[2082]: W0412 18:46:15.516742 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.516869 kubelet[2082]: E0412 18:46:15.516756 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.517232 kubelet[2082]: E0412 18:46:15.517100 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.517232 kubelet[2082]: W0412 18:46:15.517113 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.517232 kubelet[2082]: E0412 18:46:15.517126 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.517688 kubelet[2082]: E0412 18:46:15.517543 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.517688 kubelet[2082]: W0412 18:46:15.517554 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.517688 kubelet[2082]: E0412 18:46:15.517568 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.518102 kubelet[2082]: E0412 18:46:15.517972 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.518102 kubelet[2082]: W0412 18:46:15.517984 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.518102 kubelet[2082]: E0412 18:46:15.517998 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.518505 kubelet[2082]: E0412 18:46:15.518382 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.518505 kubelet[2082]: W0412 18:46:15.518393 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.518505 kubelet[2082]: E0412 18:46:15.518407 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.519402 kubelet[2082]: E0412 18:46:15.518748 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.519402 kubelet[2082]: W0412 18:46:15.518762 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.519402 kubelet[2082]: E0412 18:46:15.518781 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.519402 kubelet[2082]: E0412 18:46:15.519167 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.519402 kubelet[2082]: W0412 18:46:15.519180 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.519402 kubelet[2082]: E0412 18:46:15.519199 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.520067 kubelet[2082]: E0412 18:46:15.520048 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.522361 kubelet[2082]: W0412 18:46:15.522335 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.522512 kubelet[2082]: E0412 18:46:15.522497 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.522990 kubelet[2082]: E0412 18:46:15.522971 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.523120 kubelet[2082]: W0412 18:46:15.523101 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.523254 kubelet[2082]: E0412 18:46:15.523240 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.523695 kubelet[2082]: E0412 18:46:15.523677 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.523830 kubelet[2082]: W0412 18:46:15.523814 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.523946 kubelet[2082]: E0412 18:46:15.523933 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.524448 kubelet[2082]: E0412 18:46:15.524432 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.524585 kubelet[2082]: W0412 18:46:15.524567 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.524695 kubelet[2082]: E0412 18:46:15.524681 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.525086 kubelet[2082]: E0412 18:46:15.525070 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.525227 kubelet[2082]: W0412 18:46:15.525210 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.525368 kubelet[2082]: E0412 18:46:15.525355 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.525745 kubelet[2082]: E0412 18:46:15.525729 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.528019 kubelet[2082]: W0412 18:46:15.527994 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.528178 kubelet[2082]: E0412 18:46:15.528159 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.528657 kubelet[2082]: E0412 18:46:15.528640 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.528807 kubelet[2082]: W0412 18:46:15.528787 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.528941 kubelet[2082]: E0412 18:46:15.528926 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.529394 kubelet[2082]: E0412 18:46:15.529376 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.529518 kubelet[2082]: W0412 18:46:15.529501 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.529630 kubelet[2082]: E0412 18:46:15.529617 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.530177 kubelet[2082]: E0412 18:46:15.530160 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.530335 kubelet[2082]: W0412 18:46:15.530275 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.530494 kubelet[2082]: E0412 18:46:15.530477 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.530914 kubelet[2082]: E0412 18:46:15.530895 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.531060 kubelet[2082]: W0412 18:46:15.531040 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.531208 kubelet[2082]: E0412 18:46:15.531193 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.531670 kubelet[2082]: E0412 18:46:15.531651 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.533825 kubelet[2082]: W0412 18:46:15.533801 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.533986 kubelet[2082]: E0412 18:46:15.533971 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.534878 kubelet[2082]: E0412 18:46:15.534860 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.535026 kubelet[2082]: W0412 18:46:15.535009 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.535142 kubelet[2082]: E0412 18:46:15.535129 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.535639 kubelet[2082]: E0412 18:46:15.535622 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.535767 kubelet[2082]: W0412 18:46:15.535750 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.535880 kubelet[2082]: E0412 18:46:15.535866 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.536468 kubelet[2082]: E0412 18:46:15.536451 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.537386 kubelet[2082]: W0412 18:46:15.537356 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.537547 kubelet[2082]: E0412 18:46:15.537531 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.538184 kubelet[2082]: E0412 18:46:15.538166 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.538378 kubelet[2082]: W0412 18:46:15.538351 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.538526 kubelet[2082]: E0412 18:46:15.538508 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.539191 kubelet[2082]: E0412 18:46:15.539173 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.539410 kubelet[2082]: W0412 18:46:15.539388 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.539583 kubelet[2082]: E0412 18:46:15.539567 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.540032 kubelet[2082]: E0412 18:46:15.540015 2082 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:46:15.540177 kubelet[2082]: W0412 18:46:15.540158 2082 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:46:15.540363 kubelet[2082]: E0412 18:46:15.540344 2082 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:46:15.562712 systemd[1]: Started cri-containerd-c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096.scope. Apr 12 18:46:15.615281 systemd[1]: run-containerd-runc-k8s.io-c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096-runc.S6hh8I.mount: Deactivated successfully. Apr 12 18:46:15.697000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.697000 audit[2654]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f95b05e6668 items=0 ppid=2535 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:15.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343231656264366638656338303636663433646138336136333262 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit: BPF prog-id=142 op=LOAD Apr 12 18:46:15.698000 audit[2654]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0003d0128 items=0 ppid=2535 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343231656264366638656338303636663433646138336136333262 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit: BPF prog-id=143 op=LOAD Apr 12 18:46:15.698000 audit[2654]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003d0178 items=0 ppid=2535 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343231656264366638656338303636663433646138336136333262 Apr 12 18:46:15.698000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:46:15.698000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:15.698000 audit: BPF prog-id=144 op=LOAD Apr 12 18:46:15.698000 audit[2654]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0003d0208 items=0 ppid=2535 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:15.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337343231656264366638656338303636663433646138336136333262 Apr 12 18:46:15.727576 env[1143]: time="2024-04-12T18:46:15.727515415Z" level=info msg="StartContainer for \"c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096\" returns successfully" Apr 12 18:46:15.762541 systemd[1]: cri-containerd-c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096.scope: Deactivated successfully. Apr 12 18:46:15.764000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:46:15.799591 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096-rootfs.mount: Deactivated successfully. Apr 12 18:46:16.357533 kubelet[2082]: E0412 18:46:16.357472 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:16.380135 env[1143]: time="2024-04-12T18:46:16.380046968Z" level=info msg="shim disconnected" id=c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096 Apr 12 18:46:16.380135 env[1143]: time="2024-04-12T18:46:16.380130172Z" level=warning msg="cleaning up after shim disconnected" id=c7421ebd6f8ec8066f43da83a632b4f0e367cd8c25064fa62f8b19a2bd74a096 namespace=k8s.io Apr 12 18:46:16.380135 env[1143]: time="2024-04-12T18:46:16.380147327Z" level=info msg="cleaning up dead shim" Apr 12 18:46:16.394199 env[1143]: time="2024-04-12T18:46:16.394110682Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:46:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2727 runtime=io.containerd.runc.v2\n" Apr 12 18:46:16.492385 env[1143]: time="2024-04-12T18:46:16.488915252Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:46:17.347951 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3906003051.mount: Deactivated successfully. Apr 12 18:46:18.358113 kubelet[2082]: E0412 18:46:18.357727 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:20.357218 kubelet[2082]: E0412 18:46:20.357174 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:21.202961 env[1143]: time="2024-04-12T18:46:21.202888202Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:21.205767 env[1143]: time="2024-04-12T18:46:21.205721666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:21.208570 env[1143]: time="2024-04-12T18:46:21.208525268Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:21.211227 env[1143]: time="2024-04-12T18:46:21.211189459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:21.214037 env[1143]: time="2024-04-12T18:46:21.213991944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:46:21.217128 env[1143]: time="2024-04-12T18:46:21.217055367Z" level=info msg="CreateContainer within sandbox \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:46:21.240312 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4107315811.mount: Deactivated successfully. Apr 12 18:46:21.253699 env[1143]: time="2024-04-12T18:46:21.253605331Z" level=info msg="CreateContainer within sandbox \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141\"" Apr 12 18:46:21.256560 env[1143]: time="2024-04-12T18:46:21.256495289Z" level=info msg="StartContainer for \"7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141\"" Apr 12 18:46:21.306090 systemd[1]: run-containerd-runc-k8s.io-7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141-runc.BTNj7y.mount: Deactivated successfully. Apr 12 18:46:21.312010 systemd[1]: Started cri-containerd-7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141.scope. Apr 12 18:46:21.363905 kernel: kauditd_printk_skb: 97 callbacks suppressed Apr 12 18:46:21.364104 kernel: audit: type=1400 audit(1712947581.336:1173): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.336000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.336000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f43d4a879a0 items=0 ppid=2535 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:21.397677 kernel: audit: type=1300 audit(1712947581.336:1173): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f43d4a879a0 items=0 ppid=2535 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:21.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363762613032386536316636373933363661333732356661396432 Apr 12 18:46:21.428492 kernel: audit: type=1327 audit(1712947581.336:1173): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363762613032386536316636373933363661333732356661396432 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.470891 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.471108 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.514733 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.514907 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.536336 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.559797 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.560001 kernel: audit: type=1400 audit(1712947581.337:1174): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.566711 env[1143]: time="2024-04-12T18:46:21.566481897Z" level=info msg="StartContainer for \"7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141\" returns successfully" Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.337000 audit: BPF prog-id=145 op=LOAD Apr 12 18:46:21.337000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00039ece8 items=0 ppid=2535 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:21.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363762613032386536316636373933363661333732356661396432 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit: BPF prog-id=146 op=LOAD Apr 12 18:46:21.397000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00039ed38 items=0 ppid=2535 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:21.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363762613032386536316636373933363661333732356661396432 Apr 12 18:46:21.397000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:46:21.397000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:21.397000 audit: BPF prog-id=147 op=LOAD Apr 12 18:46:21.397000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00039edc8 items=0 ppid=2535 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:21.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735363762613032386536316636373933363661333732356661396432 Apr 12 18:46:22.244604 systemd[1]: cri-containerd-7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141.scope: Deactivated successfully. Apr 12 18:46:22.249000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:46:22.276136 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141-rootfs.mount: Deactivated successfully. Apr 12 18:46:22.335995 kubelet[2082]: I0412 18:46:22.333430 2082 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:46:22.357309 kubelet[2082]: I0412 18:46:22.357238 2082 topology_manager.go:215] "Topology Admit Handler" podUID="488a70c9-339f-499d-bbfb-0fcd4ff1daea" podNamespace="kube-system" podName="coredns-5dd5756b68-94tl7" Apr 12 18:46:22.365551 systemd[1]: Created slice kubepods-besteffort-podeb8b1a80_44e3_4847_af88_1b94ddb35dc1.slice. Apr 12 18:46:22.372531 env[1143]: time="2024-04-12T18:46:22.372344978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v7dqp,Uid:eb8b1a80-44e3-4847-af88-1b94ddb35dc1,Namespace:calico-system,Attempt:0,}" Apr 12 18:46:22.373054 kubelet[2082]: I0412 18:46:22.372997 2082 topology_manager.go:215] "Topology Admit Handler" podUID="9e21d4fe-eb70-45c2-9f60-11ba5c0644fd" podNamespace="kube-system" podName="coredns-5dd5756b68-sr9n7" Apr 12 18:46:22.374212 kubelet[2082]: I0412 18:46:22.374175 2082 topology_manager.go:215] "Topology Admit Handler" podUID="16beed0b-65d2-4f9a-9a36-417cee7a8ecb" podNamespace="calico-system" podName="calico-kube-controllers-65c84588db-r2hlv" Apr 12 18:46:22.378078 systemd[1]: Created slice kubepods-burstable-pod488a70c9_339f_499d_bbfb_0fcd4ff1daea.slice. Apr 12 18:46:22.392572 systemd[1]: Created slice kubepods-burstable-pod9e21d4fe_eb70_45c2_9f60_11ba5c0644fd.slice. Apr 12 18:46:22.406032 systemd[1]: Created slice kubepods-besteffort-pod16beed0b_65d2_4f9a_9a36_417cee7a8ecb.slice. Apr 12 18:46:22.479689 kubelet[2082]: I0412 18:46:22.407031 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dhqdb\" (UniqueName: \"kubernetes.io/projected/16beed0b-65d2-4f9a-9a36-417cee7a8ecb-kube-api-access-dhqdb\") pod \"calico-kube-controllers-65c84588db-r2hlv\" (UID: \"16beed0b-65d2-4f9a-9a36-417cee7a8ecb\") " pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" Apr 12 18:46:22.479689 kubelet[2082]: I0412 18:46:22.407108 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ht657\" (UniqueName: \"kubernetes.io/projected/488a70c9-339f-499d-bbfb-0fcd4ff1daea-kube-api-access-ht657\") pod \"coredns-5dd5756b68-94tl7\" (UID: \"488a70c9-339f-499d-bbfb-0fcd4ff1daea\") " pod="kube-system/coredns-5dd5756b68-94tl7" Apr 12 18:46:22.479689 kubelet[2082]: I0412 18:46:22.407145 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h6fpl\" (UniqueName: \"kubernetes.io/projected/9e21d4fe-eb70-45c2-9f60-11ba5c0644fd-kube-api-access-h6fpl\") pod \"coredns-5dd5756b68-sr9n7\" (UID: \"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd\") " pod="kube-system/coredns-5dd5756b68-sr9n7" Apr 12 18:46:22.479689 kubelet[2082]: I0412 18:46:22.407181 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/488a70c9-339f-499d-bbfb-0fcd4ff1daea-config-volume\") pod \"coredns-5dd5756b68-94tl7\" (UID: \"488a70c9-339f-499d-bbfb-0fcd4ff1daea\") " pod="kube-system/coredns-5dd5756b68-94tl7" Apr 12 18:46:22.479689 kubelet[2082]: I0412 18:46:22.407222 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/16beed0b-65d2-4f9a-9a36-417cee7a8ecb-tigera-ca-bundle\") pod \"calico-kube-controllers-65c84588db-r2hlv\" (UID: \"16beed0b-65d2-4f9a-9a36-417cee7a8ecb\") " pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" Apr 12 18:46:22.480221 kubelet[2082]: I0412 18:46:22.407258 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9e21d4fe-eb70-45c2-9f60-11ba5c0644fd-config-volume\") pod \"coredns-5dd5756b68-sr9n7\" (UID: \"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd\") " pod="kube-system/coredns-5dd5756b68-sr9n7" Apr 12 18:46:22.687493 env[1143]: time="2024-04-12T18:46:22.687415174Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-94tl7,Uid:488a70c9-339f-499d-bbfb-0fcd4ff1daea,Namespace:kube-system,Attempt:0,}" Apr 12 18:46:22.785526 env[1143]: time="2024-04-12T18:46:22.785460315Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sr9n7,Uid:9e21d4fe-eb70-45c2-9f60-11ba5c0644fd,Namespace:kube-system,Attempt:0,}" Apr 12 18:46:22.785773 env[1143]: time="2024-04-12T18:46:22.785462284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c84588db-r2hlv,Uid:16beed0b-65d2-4f9a-9a36-417cee7a8ecb,Namespace:calico-system,Attempt:0,}" Apr 12 18:46:22.991732 env[1143]: time="2024-04-12T18:46:22.991144349Z" level=info msg="shim disconnected" id=7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141 Apr 12 18:46:22.991732 env[1143]: time="2024-04-12T18:46:22.991210511Z" level=warning msg="cleaning up after shim disconnected" id=7567ba028e61f679366a3725fa9d206defdaedeeef6ce9bb4d2a6cb519dd4141 namespace=k8s.io Apr 12 18:46:22.991732 env[1143]: time="2024-04-12T18:46:22.991224422Z" level=info msg="cleaning up dead shim" Apr 12 18:46:23.015248 env[1143]: time="2024-04-12T18:46:23.013323846Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:46:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2797 runtime=io.containerd.runc.v2\ntime=\"2024-04-12T18:46:23Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" Apr 12 18:46:23.178809 env[1143]: time="2024-04-12T18:46:23.178716239Z" level=error msg="Failed to destroy network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.179555 env[1143]: time="2024-04-12T18:46:23.179498726Z" level=error msg="encountered an error cleaning up failed sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.179834 env[1143]: time="2024-04-12T18:46:23.179787723Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-94tl7,Uid:488a70c9-339f-499d-bbfb-0fcd4ff1daea,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.180829 kubelet[2082]: E0412 18:46:23.180291 2082 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.180829 kubelet[2082]: E0412 18:46:23.180391 2082 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-94tl7" Apr 12 18:46:23.180829 kubelet[2082]: E0412 18:46:23.180427 2082 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-94tl7" Apr 12 18:46:23.181134 kubelet[2082]: E0412 18:46:23.180497 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-94tl7_kube-system(488a70c9-339f-499d-bbfb-0fcd4ff1daea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-94tl7_kube-system(488a70c9-339f-499d-bbfb-0fcd4ff1daea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-94tl7" podUID="488a70c9-339f-499d-bbfb-0fcd4ff1daea" Apr 12 18:46:23.219682 env[1143]: time="2024-04-12T18:46:23.219598089Z" level=error msg="Failed to destroy network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.220164 env[1143]: time="2024-04-12T18:46:23.220105483Z" level=error msg="encountered an error cleaning up failed sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.220318 env[1143]: time="2024-04-12T18:46:23.220195629Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v7dqp,Uid:eb8b1a80-44e3-4847-af88-1b94ddb35dc1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.220530 kubelet[2082]: E0412 18:46:23.220502 2082 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.220640 kubelet[2082]: E0412 18:46:23.220574 2082 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:23.220640 kubelet[2082]: E0412 18:46:23.220614 2082 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-v7dqp" Apr 12 18:46:23.220760 kubelet[2082]: E0412 18:46:23.220685 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-v7dqp_calico-system(eb8b1a80-44e3-4847-af88-1b94ddb35dc1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-v7dqp_calico-system(eb8b1a80-44e3-4847-af88-1b94ddb35dc1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:23.282112 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b-shm.mount: Deactivated successfully. Apr 12 18:46:23.282238 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370-shm.mount: Deactivated successfully. Apr 12 18:46:23.283478 env[1143]: time="2024-04-12T18:46:23.280431371Z" level=error msg="Failed to destroy network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.287842 env[1143]: time="2024-04-12T18:46:23.287733522Z" level=error msg="encountered an error cleaning up failed sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.287966 env[1143]: time="2024-04-12T18:46:23.287839204Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c84588db-r2hlv,Uid:16beed0b-65d2-4f9a-9a36-417cee7a8ecb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.289334 kubelet[2082]: E0412 18:46:23.289259 2082 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.289480 kubelet[2082]: E0412 18:46:23.289371 2082 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" Apr 12 18:46:23.289480 kubelet[2082]: E0412 18:46:23.289409 2082 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" Apr 12 18:46:23.289600 kubelet[2082]: E0412 18:46:23.289482 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-65c84588db-r2hlv_calico-system(16beed0b-65d2-4f9a-9a36-417cee7a8ecb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-65c84588db-r2hlv_calico-system(16beed0b-65d2-4f9a-9a36-417cee7a8ecb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" podUID="16beed0b-65d2-4f9a-9a36-417cee7a8ecb" Apr 12 18:46:23.292250 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7-shm.mount: Deactivated successfully. Apr 12 18:46:23.296215 env[1143]: time="2024-04-12T18:46:23.296153863Z" level=error msg="Failed to destroy network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.299474 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84-shm.mount: Deactivated successfully. Apr 12 18:46:23.300604 env[1143]: time="2024-04-12T18:46:23.300197147Z" level=error msg="encountered an error cleaning up failed sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.300604 env[1143]: time="2024-04-12T18:46:23.300287012Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sr9n7,Uid:9e21d4fe-eb70-45c2-9f60-11ba5c0644fd,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.300809 kubelet[2082]: E0412 18:46:23.300602 2082 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.300809 kubelet[2082]: E0412 18:46:23.300689 2082 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-sr9n7" Apr 12 18:46:23.300809 kubelet[2082]: E0412 18:46:23.300743 2082 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-sr9n7" Apr 12 18:46:23.300999 kubelet[2082]: E0412 18:46:23.300841 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-sr9n7_kube-system(9e21d4fe-eb70-45c2-9f60-11ba5c0644fd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-sr9n7_kube-system(9e21d4fe-eb70-45c2-9f60-11ba5c0644fd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-sr9n7" podUID="9e21d4fe-eb70-45c2-9f60-11ba5c0644fd" Apr 12 18:46:23.525412 kubelet[2082]: I0412 18:46:23.525365 2082 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:46:23.528265 env[1143]: time="2024-04-12T18:46:23.526475856Z" level=info msg="StopPodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\"" Apr 12 18:46:23.531082 kubelet[2082]: I0412 18:46:23.531055 2082 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:23.535194 env[1143]: time="2024-04-12T18:46:23.534419597Z" level=info msg="StopPodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\"" Apr 12 18:46:23.555212 env[1143]: time="2024-04-12T18:46:23.555147370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:46:23.559689 kubelet[2082]: I0412 18:46:23.559653 2082 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:23.563620 env[1143]: time="2024-04-12T18:46:23.563544082Z" level=info msg="StopPodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\"" Apr 12 18:46:23.571266 kubelet[2082]: I0412 18:46:23.570567 2082 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:46:23.573707 env[1143]: time="2024-04-12T18:46:23.573661490Z" level=info msg="StopPodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\"" Apr 12 18:46:23.623327 env[1143]: time="2024-04-12T18:46:23.623227236Z" level=error msg="StopPodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" failed" error="failed to destroy network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.623728 kubelet[2082]: E0412 18:46:23.623675 2082 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:46:23.623870 kubelet[2082]: E0412 18:46:23.623830 2082 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b"} Apr 12 18:46:23.623942 kubelet[2082]: E0412 18:46:23.623909 2082 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"488a70c9-339f-499d-bbfb-0fcd4ff1daea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:46:23.624067 kubelet[2082]: E0412 18:46:23.623990 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"488a70c9-339f-499d-bbfb-0fcd4ff1daea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-94tl7" podUID="488a70c9-339f-499d-bbfb-0fcd4ff1daea" Apr 12 18:46:23.664272 env[1143]: time="2024-04-12T18:46:23.664189805Z" level=error msg="StopPodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" failed" error="failed to destroy network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.664658 kubelet[2082]: E0412 18:46:23.664629 2082 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:23.664801 kubelet[2082]: E0412 18:46:23.664737 2082 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370"} Apr 12 18:46:23.664878 kubelet[2082]: E0412 18:46:23.664816 2082 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:46:23.665014 kubelet[2082]: E0412 18:46:23.664882 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eb8b1a80-44e3-4847-af88-1b94ddb35dc1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-v7dqp" podUID="eb8b1a80-44e3-4847-af88-1b94ddb35dc1" Apr 12 18:46:23.695569 env[1143]: time="2024-04-12T18:46:23.695494256Z" level=error msg="StopPodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" failed" error="failed to destroy network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.696294 kubelet[2082]: E0412 18:46:23.696081 2082 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:23.696294 kubelet[2082]: E0412 18:46:23.696140 2082 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7"} Apr 12 18:46:23.696294 kubelet[2082]: E0412 18:46:23.696195 2082 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"16beed0b-65d2-4f9a-9a36-417cee7a8ecb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:46:23.696294 kubelet[2082]: E0412 18:46:23.696245 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"16beed0b-65d2-4f9a-9a36-417cee7a8ecb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" podUID="16beed0b-65d2-4f9a-9a36-417cee7a8ecb" Apr 12 18:46:23.696952 env[1143]: time="2024-04-12T18:46:23.696895904Z" level=error msg="StopPodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" failed" error="failed to destroy network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:46:23.697189 kubelet[2082]: E0412 18:46:23.697147 2082 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:46:23.697189 kubelet[2082]: E0412 18:46:23.697190 2082 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84"} Apr 12 18:46:23.697405 kubelet[2082]: E0412 18:46:23.697239 2082 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:46:23.697405 kubelet[2082]: E0412 18:46:23.697281 2082 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-sr9n7" podUID="9e21d4fe-eb70-45c2-9f60-11ba5c0644fd" Apr 12 18:46:30.179051 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4198877488.mount: Deactivated successfully. Apr 12 18:46:30.242214 env[1143]: time="2024-04-12T18:46:30.242150267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:30.245472 env[1143]: time="2024-04-12T18:46:30.245412184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:30.248334 env[1143]: time="2024-04-12T18:46:30.248269125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:30.250739 env[1143]: time="2024-04-12T18:46:30.250693413Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:30.251479 env[1143]: time="2024-04-12T18:46:30.251436774Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:46:30.276869 env[1143]: time="2024-04-12T18:46:30.276801028Z" level=info msg="CreateContainer within sandbox \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:46:30.311657 env[1143]: time="2024-04-12T18:46:30.311591500Z" level=info msg="CreateContainer within sandbox \"c2a86a79709072118c04f7a50cbcf19eb4bef7d48ce25516ed38a6bf19bea662\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a\"" Apr 12 18:46:30.314102 env[1143]: time="2024-04-12T18:46:30.312582361Z" level=info msg="StartContainer for \"4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a\"" Apr 12 18:46:30.345600 systemd[1]: Started cri-containerd-4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a.scope. Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.384908 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:46:30.385091 kernel: audit: type=1400 audit(1712947590.377:1180): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ffa1068aa18 items=0 ppid=2535 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:30.438949 kernel: audit: type=1300 audit(1712947590.377:1180): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ffa1068aa18 items=0 ppid=2535 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:30.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306262316633356330303664313930313063333964366433623132 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.478835 env[1143]: time="2024-04-12T18:46:30.478764287Z" level=info msg="StartContainer for \"4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a\" returns successfully" Apr 12 18:46:30.491939 kernel: audit: type=1327 audit(1712947590.377:1180): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306262316633356330303664313930313063333964366433623132 Apr 12 18:46:30.492164 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.513337 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.557343 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.557504 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.579115 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.629047 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.629201 kernel: audit: type=1400 audit(1712947590.377:1181): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit: BPF prog-id=148 op=LOAD Apr 12 18:46:30.377000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ba8 items=0 ppid=2535 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:30.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306262316633356330303664313930313063333964366433623132 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit: BPF prog-id=149 op=LOAD Apr 12 18:46:30.377000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9bf8 items=0 ppid=2535 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:30.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306262316633356330303664313930313063333964366433623132 Apr 12 18:46:30.377000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:46:30.377000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:30.377000 audit: BPF prog-id=150 op=LOAD Apr 12 18:46:30.377000 audit[3033]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c88 items=0 ppid=2535 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:30.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465306262316633356330303664313930313063333964366433623132 Apr 12 18:46:30.714009 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:46:30.714193 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:46:31.668486 systemd[1]: run-containerd-runc-k8s.io-4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a-runc.41oUDD.mount: Deactivated successfully. Apr 12 18:46:32.156000 audit[3176]: AVC avc: denied { write } for pid=3176 comm="tee" name="fd" dev="proc" ino=24583 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.156000 audit[3176]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc7e9891e a2=241 a3=1b6 items=1 ppid=3142 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.156000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:46:32.156000 audit: PATH item=0 name="/dev/fd/63" inode=24425 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.156000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.176000 audit[3180]: AVC avc: denied { write } for pid=3180 comm="tee" name="fd" dev="proc" ino=24438 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.176000 audit[3180]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea2a3292f a2=241 a3=1b6 items=1 ppid=3150 pid=3180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.176000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:46:32.176000 audit: PATH item=0 name="/dev/fd/63" inode=24428 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.176000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.202000 audit[3197]: AVC avc: denied { write } for pid=3197 comm="tee" name="fd" dev="proc" ino=24600 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.208000 audit[3205]: AVC avc: denied { write } for pid=3205 comm="tee" name="fd" dev="proc" ino=24603 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.202000 audit[3197]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdccebc91d a2=241 a3=1b6 items=1 ppid=3140 pid=3197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.202000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:46:32.202000 audit: PATH item=0 name="/dev/fd/63" inode=24591 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.202000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.226000 audit[3203]: AVC avc: denied { write } for pid=3203 comm="tee" name="fd" dev="proc" ino=24610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.243000 audit[3199]: AVC avc: denied { write } for pid=3199 comm="tee" name="fd" dev="proc" ino=24617 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.244000 audit[3201]: AVC avc: denied { write } for pid=3201 comm="tee" name="fd" dev="proc" ino=24620 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:46:32.208000 audit[3205]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc29c2e92d a2=241 a3=1b6 items=1 ppid=3143 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.208000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:46:32.208000 audit: PATH item=0 name="/dev/fd/63" inode=24597 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.208000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.243000 audit[3199]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9d19d92d a2=241 a3=1b6 items=1 ppid=3152 pid=3199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.243000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:46:32.243000 audit: PATH item=0 name="/dev/fd/63" inode=24596 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.244000 audit[3201]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffea21b92e a2=241 a3=1b6 items=1 ppid=3154 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.244000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:46:32.244000 audit: PATH item=0 name="/dev/fd/63" inode=24446 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.244000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.226000 audit[3203]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4db9992d a2=241 a3=1b6 items=1 ppid=3144 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.226000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:46:32.226000 audit: PATH item=0 name="/dev/fd/63" inode=24447 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:46:32.226000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:46:32.682168 systemd[1]: run-containerd-runc-k8s.io-4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a-runc.IC1kc8.mount: Deactivated successfully. Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.800000 audit: BPF prog-id=151 op=LOAD Apr 12 18:46:32.800000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff387524b0 a2=70 a3=7fa784a24000 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.800000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.801000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.802000 audit: BPF prog-id=152 op=LOAD Apr 12 18:46:32.802000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff387524b0 a2=70 a3=6f items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.802000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.803000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:46:32.803000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.803000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff38752460 a2=70 a3=7fff387524b0 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.803000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.804000 audit: BPF prog-id=153 op=LOAD Apr 12 18:46:32.804000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff38752440 a2=70 a3=7fff387524b0 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.804000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.805000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:46:32.805000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.805000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38752520 a2=70 a3=0 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.805000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.806000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.806000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38752510 a2=70 a3=0 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.806000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.806000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.806000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff38752480 a2=70 a3=0 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.806000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.808000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.808000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fff38752550 a2=70 a3=108fe10 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.808000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.808000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.808000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff38752550 a2=70 a3=108c880 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.808000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { perfmon } for pid=3298 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit[3298]: AVC avc: denied { bpf } for pid=3298 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.809000 audit: BPF prog-id=154 op=LOAD Apr 12 18:46:32.809000 audit[3298]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff38752470 a2=70 a3=0 items=0 ppid=3153 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.809000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:46:32.816000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.816000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe33af82c0 a2=70 a3=fff80800 items=0 ppid=3153 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.816000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:46:32.816000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:32.816000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe33af8190 a2=70 a3=3 items=0 ppid=3153 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.816000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:46:32.826000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:46:32.828495 systemd-networkd[1025]: calico_tmp_B: Failed to manage SR-IOV PF and VF ports, ignoring: Invalid argument Apr 12 18:46:32.826000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=32 a0=3 a1=7fff38c552b0 a2=0 a3=0 items=0 ppid=3153 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.826000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Apr 12 18:46:32.937000 audit[3323]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:32.937000 audit[3323]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc1862a320 a2=0 a3=7ffc1862a30c items=0 ppid=3153 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:32.938000 audit[3329]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=3329 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:32.938000 audit[3329]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdabb67fc0 a2=0 a3=7ffdabb67fac items=0 ppid=3153 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.938000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:32.946000 audit[3324]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3324 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:32.946000 audit[3324]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd2d06af80 a2=0 a3=7ffd2d06af6c items=0 ppid=3153 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.946000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:32.947000 audit[3326]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3326 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:32.947000 audit[3326]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffacb894f0 a2=0 a3=7fffacb894dc items=0 ppid=3153 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:32.947000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:32.961000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:32.962000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:32.962000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d7a160 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:46:32.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:46:32.961000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001e186c0 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:46:32.961000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:46:33.597810 systemd-networkd[1025]: vxlan.calico: Link UP Apr 12 18:46:33.597823 systemd-networkd[1025]: vxlan.calico: Gained carrier Apr 12 18:46:33.610000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:33.610000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e7305a0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:46:33.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:46:33.612000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:33.612000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e0bd8f0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:46:33.612000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:46:33.612000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:33.612000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e0bd950 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:46:33.612000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:46:33.615000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:33.615000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e1c0de0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:46:33.615000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:46:33.739000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:33.739000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e838140 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:46:33.739000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:46:33.739000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:33.739000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00e1c1410 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:46:33.739000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:46:34.358571 env[1143]: time="2024-04-12T18:46:34.358513372Z" level=info msg="StopPodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\"" Apr 12 18:46:34.359843 env[1143]: time="2024-04-12T18:46:34.359789119Z" level=info msg="StopPodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\"" Apr 12 18:46:34.448932 kubelet[2082]: I0412 18:46:34.448157 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-dj6vt" podStartSLOduration=5.322265379 podCreationTimestamp="2024-04-12 18:46:10 +0000 UTC" firstStartedPulling="2024-04-12 18:46:11.126451431 +0000 UTC m=+34.012310293" lastFinishedPulling="2024-04-12 18:46:30.252287352 +0000 UTC m=+53.138146210" observedRunningTime="2024-04-12 18:46:30.673145713 +0000 UTC m=+53.559004583" watchObservedRunningTime="2024-04-12 18:46:34.448101296 +0000 UTC m=+57.333960162" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.446 [INFO][3369] k8s.go 585: Cleaning up netns ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.446 [INFO][3369] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" iface="eth0" netns="/var/run/netns/cni-3e8ece58-f75a-1a93-ce63-953f854ecefe" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.447 [INFO][3369] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" iface="eth0" netns="/var/run/netns/cni-3e8ece58-f75a-1a93-ce63-953f854ecefe" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.447 [INFO][3369] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" iface="eth0" netns="/var/run/netns/cni-3e8ece58-f75a-1a93-ce63-953f854ecefe" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.447 [INFO][3369] k8s.go 592: Releasing IP address(es) ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.447 [INFO][3369] utils.go 188: Calico CNI releasing IP address ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.499 [INFO][3381] ipam_plugin.go 415: Releasing address using handleID ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.499 [INFO][3381] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.499 [INFO][3381] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.509 [WARNING][3381] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.509 [INFO][3381] ipam_plugin.go 443: Releasing address using workloadID ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.511 [INFO][3381] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:34.516465 env[1143]: 2024-04-12 18:46:34.513 [INFO][3369] k8s.go 598: Teardown processing complete. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:34.522160 env[1143]: time="2024-04-12T18:46:34.520667311Z" level=info msg="TearDown network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" successfully" Apr 12 18:46:34.522160 env[1143]: time="2024-04-12T18:46:34.520718246Z" level=info msg="StopPodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" returns successfully" Apr 12 18:46:34.520326 systemd[1]: run-netns-cni\x2d3e8ece58\x2df75a\x2d1a93\x2dce63\x2d953f854ecefe.mount: Deactivated successfully. Apr 12 18:46:34.523706 env[1143]: time="2024-04-12T18:46:34.523659223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c84588db-r2hlv,Uid:16beed0b-65d2-4f9a-9a36-417cee7a8ecb,Namespace:calico-system,Attempt:1,}" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.454 [INFO][3368] k8s.go 585: Cleaning up netns ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.455 [INFO][3368] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" iface="eth0" netns="/var/run/netns/cni-0cbdf0e6-e180-ddcc-08b0-41d0e743d36c" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.455 [INFO][3368] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" iface="eth0" netns="/var/run/netns/cni-0cbdf0e6-e180-ddcc-08b0-41d0e743d36c" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.456 [INFO][3368] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" iface="eth0" netns="/var/run/netns/cni-0cbdf0e6-e180-ddcc-08b0-41d0e743d36c" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.456 [INFO][3368] k8s.go 592: Releasing IP address(es) ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.457 [INFO][3368] utils.go 188: Calico CNI releasing IP address ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.507 [INFO][3386] ipam_plugin.go 415: Releasing address using handleID ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.507 [INFO][3386] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.511 [INFO][3386] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.529 [WARNING][3386] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.529 [INFO][3386] ipam_plugin.go 443: Releasing address using workloadID ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.532 [INFO][3386] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:34.537691 env[1143]: 2024-04-12 18:46:34.536 [INFO][3368] k8s.go 598: Teardown processing complete. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:34.541528 env[1143]: time="2024-04-12T18:46:34.541468785Z" level=info msg="TearDown network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" successfully" Apr 12 18:46:34.546320 env[1143]: time="2024-04-12T18:46:34.541629321Z" level=info msg="StopPodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" returns successfully" Apr 12 18:46:34.546320 env[1143]: time="2024-04-12T18:46:34.542792763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v7dqp,Uid:eb8b1a80-44e3-4847-af88-1b94ddb35dc1,Namespace:calico-system,Attempt:1,}" Apr 12 18:46:34.545136 systemd[1]: run-netns-cni\x2d0cbdf0e6\x2de180\x2dddcc\x2d08b0\x2d41d0e743d36c.mount: Deactivated successfully. Apr 12 18:46:34.799514 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:46:34.793363 systemd-networkd[1025]: calic715b11026b: Link UP Apr 12 18:46:34.810436 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic715b11026b: link becomes ready Apr 12 18:46:34.814579 systemd-networkd[1025]: calic715b11026b: Gained carrier Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.654 [INFO][3394] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0 calico-kube-controllers-65c84588db- calico-system 16beed0b-65d2-4f9a-9a36-417cee7a8ecb 725 0 2024-04-12 18:46:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:65c84588db projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal calico-kube-controllers-65c84588db-r2hlv eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic715b11026b [] []}} ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.659 [INFO][3394] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.720 [INFO][3418] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" HandleID="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.736 [INFO][3418] ipam_plugin.go 268: Auto assigning IP ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" HandleID="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9500), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", "pod":"calico-kube-controllers-65c84588db-r2hlv", "timestamp":"2024-04-12 18:46:34.720632918 +0000 UTC"}, Hostname:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.737 [INFO][3418] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.737 [INFO][3418] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.737 [INFO][3418] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal' Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.740 [INFO][3418] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.753 [INFO][3418] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.759 [INFO][3418] ipam.go 489: Trying affinity for 192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.761 [INFO][3418] ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.764 [INFO][3418] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.764 [INFO][3418] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.769 [INFO][3418] ipam.go 1682: Creating new handle: k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28 Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.773 [INFO][3418] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.786 [INFO][3418] ipam.go 1216: Successfully claimed IPs: [192.168.27.1/26] block=192.168.27.0/26 handle="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.786 [INFO][3418] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.1/26] handle="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.787 [INFO][3418] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:34.880456 env[1143]: 2024-04-12 18:46:34.787 [INFO][3418] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.1/26] IPv6=[] ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" HandleID="k8s-pod-network.ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.881722 env[1143]: 2024-04-12 18:46:34.789 [INFO][3394] k8s.go 385: Populated endpoint ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0", GenerateName:"calico-kube-controllers-65c84588db-", Namespace:"calico-system", SelfLink:"", UID:"16beed0b-65d2-4f9a-9a36-417cee7a8ecb", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c84588db", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-kube-controllers-65c84588db-r2hlv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic715b11026b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:34.881722 env[1143]: 2024-04-12 18:46:34.789 [INFO][3394] k8s.go 386: Calico CNI using IPs: [192.168.27.1/32] ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.881722 env[1143]: 2024-04-12 18:46:34.789 [INFO][3394] dataplane_linux.go 68: Setting the host side veth name to calic715b11026b ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.881722 env[1143]: 2024-04-12 18:46:34.815 [INFO][3394] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.881722 env[1143]: 2024-04-12 18:46:34.821 [INFO][3394] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0", GenerateName:"calico-kube-controllers-65c84588db-", Namespace:"calico-system", SelfLink:"", UID:"16beed0b-65d2-4f9a-9a36-417cee7a8ecb", ResourceVersion:"725", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c84588db", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28", Pod:"calico-kube-controllers-65c84588db-r2hlv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic715b11026b", MAC:"8e:d1:d0:dd:da:eb", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:34.881722 env[1143]: 2024-04-12 18:46:34.873 [INFO][3394] k8s.go 498: Wrote updated endpoint to datastore ContainerID="ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28" Namespace="calico-system" Pod="calico-kube-controllers-65c84588db-r2hlv" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:34.915808 env[1143]: time="2024-04-12T18:46:34.915705339Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:34.916066 env[1143]: time="2024-04-12T18:46:34.915767836Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:34.916066 env[1143]: time="2024-04-12T18:46:34.915796341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:34.916066 env[1143]: time="2024-04-12T18:46:34.916015764Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28 pid=3446 runtime=io.containerd.runc.v2 Apr 12 18:46:34.948888 systemd[1]: Started cri-containerd-ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28.scope. Apr 12 18:46:34.988630 systemd-networkd[1025]: calic96790b4782: Link UP Apr 12 18:46:35.001728 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic96790b4782: link becomes ready Apr 12 18:46:35.002973 systemd-networkd[1025]: calic96790b4782: Gained carrier Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.682 [INFO][3403] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0 csi-node-driver- calico-system eb8b1a80-44e3-4847-af88-1b94ddb35dc1 726 0 2024-04-12 18:46:10 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal csi-node-driver-v7dqp eth0 default [] [] [kns.calico-system ksa.calico-system.default] calic96790b4782 [] []}} ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.682 [INFO][3403] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.746 [INFO][3423] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" HandleID="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.760 [INFO][3423] ipam_plugin.go 268: Auto assigning IP ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" HandleID="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000280670), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", "pod":"csi-node-driver-v7dqp", "timestamp":"2024-04-12 18:46:34.746902239 +0000 UTC"}, Hostname:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.760 [INFO][3423] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.786 [INFO][3423] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.787 [INFO][3423] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal' Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.838 [INFO][3423] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.879 [INFO][3423] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.905 [INFO][3423] ipam.go 489: Trying affinity for 192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.913 [INFO][3423] ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.937 [INFO][3423] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.937 [INFO][3423] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.940 [INFO][3423] ipam.go 1682: Creating new handle: k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115 Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.955 [INFO][3423] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.967 [INFO][3423] ipam.go 1216: Successfully claimed IPs: [192.168.27.2/26] block=192.168.27.0/26 handle="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.967 [INFO][3423] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.2/26] handle="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.968 [INFO][3423] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:35.022099 env[1143]: 2024-04-12 18:46:34.968 [INFO][3423] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.2/26] IPv6=[] ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" HandleID="k8s-pod-network.78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.023411 env[1143]: 2024-04-12 18:46:34.973 [INFO][3403] k8s.go 385: Populated endpoint ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eb8b1a80-44e3-4847-af88-1b94ddb35dc1", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"", Pod:"csi-node-driver-v7dqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic96790b4782", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:35.023411 env[1143]: 2024-04-12 18:46:34.973 [INFO][3403] k8s.go 386: Calico CNI using IPs: [192.168.27.2/32] ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.023411 env[1143]: 2024-04-12 18:46:34.974 [INFO][3403] dataplane_linux.go 68: Setting the host side veth name to calic96790b4782 ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.023411 env[1143]: 2024-04-12 18:46:34.988 [INFO][3403] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.023411 env[1143]: 2024-04-12 18:46:35.005 [INFO][3403] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eb8b1a80-44e3-4847-af88-1b94ddb35dc1", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115", Pod:"csi-node-driver-v7dqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic96790b4782", MAC:"46:e6:f3:0a:12:d9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:35.023411 env[1143]: 2024-04-12 18:46:35.020 [INFO][3403] k8s.go 498: Wrote updated endpoint to datastore ContainerID="78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115" Namespace="calico-system" Pod="csi-node-driver-v7dqp" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:35.052349 env[1143]: time="2024-04-12T18:46:35.052138316Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:35.052784 env[1143]: time="2024-04-12T18:46:35.052568328Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:35.053175 env[1143]: time="2024-04-12T18:46:35.053084427Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:35.053832 env[1143]: time="2024-04-12T18:46:35.053740060Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115 pid=3486 runtime=io.containerd.runc.v2 Apr 12 18:46:35.085008 systemd[1]: Started cri-containerd-78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115.scope. Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.112000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.113000 audit: BPF prog-id=155 op=LOAD Apr 12 18:46:35.115000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.115000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3446 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643664326266356266383566666439643237383964663732633238 Apr 12 18:46:35.115000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.115000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3446 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643664326266356266383566666439643237383964663732633238 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.116000 audit: BPF prog-id=156 op=LOAD Apr 12 18:46:35.116000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000300b50 items=0 ppid=3446 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643664326266356266383566666439643237383964663732633238 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.120000 audit: BPF prog-id=157 op=LOAD Apr 12 18:46:35.120000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000300b98 items=0 ppid=3446 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643664326266356266383566666439643237383964663732633238 Apr 12 18:46:35.121000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:46:35.123000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.123000 audit: BPF prog-id=158 op=LOAD Apr 12 18:46:35.123000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000300fa8 items=0 ppid=3446 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561643664326266356266383566666439643237383964663732633238 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.125000 audit: BPF prog-id=159 op=LOAD Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bbc48 a2=10 a3=1c items=0 ppid=3486 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643231336665656439323430633934383361346334326632333535 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bb6b0 a2=3c a3=c items=0 ppid=3486 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643231336665656439323430633934383361346334326632333535 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit: BPF prog-id=160 op=LOAD Apr 12 18:46:35.126000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bb9d8 a2=78 a3=c0000259d0 items=0 ppid=3486 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643231336665656439323430633934383361346334326632333535 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit: BPF prog-id=161 op=LOAD Apr 12 18:46:35.126000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bb770 a2=78 a3=c000025a18 items=0 ppid=3486 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643231336665656439323430633934383361346334326632333535 Apr 12 18:46:35.126000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:46:35.126000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { perfmon } for pid=3496 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit[3496]: AVC avc: denied { bpf } for pid=3496 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:35.126000 audit: BPF prog-id=162 op=LOAD Apr 12 18:46:35.126000 audit[3496]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bbc30 a2=78 a3=c000025e28 items=0 ppid=3486 pid=3496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738643231336665656439323430633934383361346334326632333535 Apr 12 18:46:35.152170 env[1143]: time="2024-04-12T18:46:35.152105139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-v7dqp,Uid:eb8b1a80-44e3-4847-af88-1b94ddb35dc1,Namespace:calico-system,Attempt:1,} returns sandbox id \"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115\"" Apr 12 18:46:35.157712 env[1143]: time="2024-04-12T18:46:35.157659671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:46:35.165000 audit[3529]: NETFILTER_CFG table=filter:101 family=2 entries=62 op=nft_register_chain pid=3529 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:35.165000 audit[3529]: SYSCALL arch=c000003e syscall=46 success=yes exit=36144 a0=3 a1=7ffd00e890c0 a2=0 a3=7ffd00e890ac items=0 ppid=3153 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:35.165000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:35.206583 env[1143]: time="2024-04-12T18:46:35.205732833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-65c84588db-r2hlv,Uid:16beed0b-65d2-4f9a-9a36-417cee7a8ecb,Namespace:calico-system,Attempt:1,} returns sandbox id \"ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28\"" Apr 12 18:46:35.428587 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL Apr 12 18:46:35.941968 systemd-networkd[1025]: calic715b11026b: Gained IPv6LL Apr 12 18:46:36.012505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2560768649.mount: Deactivated successfully. Apr 12 18:46:36.261150 systemd-networkd[1025]: calic96790b4782: Gained IPv6LL Apr 12 18:46:36.445982 env[1143]: time="2024-04-12T18:46:36.445918289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:36.451475 env[1143]: time="2024-04-12T18:46:36.451290534Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:36.455504 env[1143]: time="2024-04-12T18:46:36.455453030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:36.459603 env[1143]: time="2024-04-12T18:46:36.459551303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:36.460787 env[1143]: time="2024-04-12T18:46:36.460727459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:46:36.464136 env[1143]: time="2024-04-12T18:46:36.463976620Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:46:36.466604 env[1143]: time="2024-04-12T18:46:36.466520434Z" level=info msg="CreateContainer within sandbox \"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:46:36.500089 env[1143]: time="2024-04-12T18:46:36.500032627Z" level=info msg="CreateContainer within sandbox \"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f968c33387e2860705717bd9a97b736501ccef1d4f9c447f0f639df2e332ec7b\"" Apr 12 18:46:36.501325 env[1143]: time="2024-04-12T18:46:36.501275111Z" level=info msg="StartContainer for \"f968c33387e2860705717bd9a97b736501ccef1d4f9c447f0f639df2e332ec7b\"" Apr 12 18:46:36.555387 systemd[1]: run-containerd-runc-k8s.io-f968c33387e2860705717bd9a97b736501ccef1d4f9c447f0f639df2e332ec7b-runc.ILsOrh.mount: Deactivated successfully. Apr 12 18:46:36.568683 systemd[1]: Started cri-containerd-f968c33387e2860705717bd9a97b736501ccef1d4f9c447f0f639df2e332ec7b.scope. Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.624087 kernel: kauditd_printk_skb: 300 callbacks suppressed Apr 12 18:46:36.624186 kernel: audit: type=1400 audit(1712947596.617:1258): avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd7ce0e4d68 items=0 ppid=3486 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:36.679099 env[1143]: time="2024-04-12T18:46:36.679028481Z" level=info msg="StartContainer for \"f968c33387e2860705717bd9a97b736501ccef1d4f9c447f0f639df2e332ec7b\" returns successfully" Apr 12 18:46:36.694344 kernel: audit: type=1300 audit(1712947596.617:1258): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fd7ce0e4d68 items=0 ppid=3486 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:36.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363863333333383765323836303730353731376264396139376237 Apr 12 18:46:36.727326 kernel: audit: type=1327 audit(1712947596.617:1258): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363863333333383765323836303730353731376264396139376237 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.769571 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.769756 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.769794 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.790487 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.833340 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.833505 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.875641 kernel: audit: type=1400 audit(1712947596.617:1259): avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.617000 audit: BPF prog-id=163 op=LOAD Apr 12 18:46:36.617000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000384768 items=0 ppid=3486 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:36.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363863333333383765323836303730353731376264396139376237 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.644000 audit: BPF prog-id=164 op=LOAD Apr 12 18:46:36.644000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003847b8 items=0 ppid=3486 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:36.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363863333333383765323836303730353731376264396139376237 Apr 12 18:46:36.644000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:46:36.644000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { perfmon } for pid=3544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:36.645000 audit: BPF prog-id=165 op=LOAD Apr 12 18:46:36.645000 audit[3544]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000384848 items=0 ppid=3486 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:36.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639363863333333383765323836303730353731376264396139376237 Apr 12 18:46:36.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.9:22-139.178.89.65:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:36.918993 systemd[1]: Started sshd@7-10.128.0.9:22-139.178.89.65:38316.service. Apr 12 18:46:37.269000 audit[3574]: USER_ACCT pid=3574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:37.269843 sshd[3574]: Accepted publickey for core from 139.178.89.65 port 38316 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:37.271000 audit[3574]: CRED_ACQ pid=3574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:37.271000 audit[3574]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd021e1880 a2=3 a3=0 items=0 ppid=1 pid=3574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:37.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:37.272165 sshd[3574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:37.280087 systemd[1]: Started session-8.scope. Apr 12 18:46:37.280749 systemd-logind[1132]: New session 8 of user core. Apr 12 18:46:37.289000 audit[3574]: USER_START pid=3574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:37.291000 audit[3576]: CRED_ACQ pid=3576 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:37.341026 env[1143]: time="2024-04-12T18:46:37.340943376Z" level=info msg="StopPodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\"" Apr 12 18:46:37.389702 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4193155954.mount: Deactivated successfully. Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.417 [WARNING][3590] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0", GenerateName:"calico-kube-controllers-65c84588db-", Namespace:"calico-system", SelfLink:"", UID:"16beed0b-65d2-4f9a-9a36-417cee7a8ecb", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c84588db", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28", Pod:"calico-kube-controllers-65c84588db-r2hlv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic715b11026b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.417 [INFO][3590] k8s.go 585: Cleaning up netns ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.417 [INFO][3590] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" iface="eth0" netns="" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.417 [INFO][3590] k8s.go 592: Releasing IP address(es) ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.417 [INFO][3590] utils.go 188: Calico CNI releasing IP address ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.457 [INFO][3598] ipam_plugin.go 415: Releasing address using handleID ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.457 [INFO][3598] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.457 [INFO][3598] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.467 [WARNING][3598] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.467 [INFO][3598] ipam_plugin.go 443: Releasing address using workloadID ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.471 [INFO][3598] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:37.477940 env[1143]: 2024-04-12 18:46:37.474 [INFO][3590] k8s.go 598: Teardown processing complete. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.489019 env[1143]: time="2024-04-12T18:46:37.479430478Z" level=info msg="TearDown network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" successfully" Apr 12 18:46:37.489019 env[1143]: time="2024-04-12T18:46:37.479487056Z" level=info msg="StopPodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" returns successfully" Apr 12 18:46:37.489019 env[1143]: time="2024-04-12T18:46:37.483711699Z" level=info msg="RemovePodSandbox for \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\"" Apr 12 18:46:37.489019 env[1143]: time="2024-04-12T18:46:37.483759322Z" level=info msg="Forcibly stopping sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\"" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.585 [WARNING][3626] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0", GenerateName:"calico-kube-controllers-65c84588db-", Namespace:"calico-system", SelfLink:"", UID:"16beed0b-65d2-4f9a-9a36-417cee7a8ecb", ResourceVersion:"730", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"65c84588db", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28", Pod:"calico-kube-controllers-65c84588db-r2hlv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic715b11026b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.586 [INFO][3626] k8s.go 585: Cleaning up netns ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.586 [INFO][3626] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" iface="eth0" netns="" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.586 [INFO][3626] k8s.go 592: Releasing IP address(es) ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.586 [INFO][3626] utils.go 188: Calico CNI releasing IP address ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.645 [INFO][3632] ipam_plugin.go 415: Releasing address using handleID ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.646 [INFO][3632] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.646 [INFO][3632] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.668 [WARNING][3632] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.669 [INFO][3632] ipam_plugin.go 443: Releasing address using workloadID ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" HandleID="k8s-pod-network.009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--kube--controllers--65c84588db--r2hlv-eth0" Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.676 [INFO][3632] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:37.681533 env[1143]: 2024-04-12 18:46:37.679 [INFO][3626] k8s.go 598: Teardown processing complete. ContainerID="009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7" Apr 12 18:46:37.682609 env[1143]: time="2024-04-12T18:46:37.682567307Z" level=info msg="TearDown network for sandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" successfully" Apr 12 18:46:37.704100 sshd[3574]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:37.705000 audit[3574]: USER_END pid=3574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:37.705000 audit[3574]: CRED_DISP pid=3574 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:37.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.9:22-139.178.89.65:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:37.708365 systemd[1]: sshd@7-10.128.0.9:22-139.178.89.65:38316.service: Deactivated successfully. Apr 12 18:46:37.711572 env[1143]: time="2024-04-12T18:46:37.708475064Z" level=info msg="RemovePodSandbox \"009880b6974bca07df4ca9a853d95fb0510aff99c412cadeb9d73fc115d0fda7\" returns successfully" Apr 12 18:46:37.709584 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:46:37.711930 systemd-logind[1132]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:46:37.714157 systemd-logind[1132]: Removed session 8. Apr 12 18:46:37.716080 env[1143]: time="2024-04-12T18:46:37.716040996Z" level=info msg="StopPodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\"" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.805 [WARNING][3654] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eb8b1a80-44e3-4847-af88-1b94ddb35dc1", ResourceVersion:"736", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115", Pod:"csi-node-driver-v7dqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic96790b4782", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.806 [INFO][3654] k8s.go 585: Cleaning up netns ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.806 [INFO][3654] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" iface="eth0" netns="" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.806 [INFO][3654] k8s.go 592: Releasing IP address(es) ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.806 [INFO][3654] utils.go 188: Calico CNI releasing IP address ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.844 [INFO][3661] ipam_plugin.go 415: Releasing address using handleID ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.844 [INFO][3661] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.844 [INFO][3661] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.855 [WARNING][3661] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.855 [INFO][3661] ipam_plugin.go 443: Releasing address using workloadID ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.857 [INFO][3661] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:37.860235 env[1143]: 2024-04-12 18:46:37.859 [INFO][3654] k8s.go 598: Teardown processing complete. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.861317 env[1143]: time="2024-04-12T18:46:37.860281451Z" level=info msg="TearDown network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" successfully" Apr 12 18:46:37.861317 env[1143]: time="2024-04-12T18:46:37.860338798Z" level=info msg="StopPodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" returns successfully" Apr 12 18:46:37.861317 env[1143]: time="2024-04-12T18:46:37.861036071Z" level=info msg="RemovePodSandbox for \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\"" Apr 12 18:46:37.861317 env[1143]: time="2024-04-12T18:46:37.861079133Z" level=info msg="Forcibly stopping sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\"" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.911 [WARNING][3679] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eb8b1a80-44e3-4847-af88-1b94ddb35dc1", ResourceVersion:"736", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 46, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115", Pod:"csi-node-driver-v7dqp", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.27.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calic96790b4782", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.911 [INFO][3679] k8s.go 585: Cleaning up netns ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.911 [INFO][3679] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" iface="eth0" netns="" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.911 [INFO][3679] k8s.go 592: Releasing IP address(es) ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.911 [INFO][3679] utils.go 188: Calico CNI releasing IP address ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.946 [INFO][3685] ipam_plugin.go 415: Releasing address using handleID ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.946 [INFO][3685] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.947 [INFO][3685] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.971 [WARNING][3685] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.971 [INFO][3685] ipam_plugin.go 443: Releasing address using workloadID ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" HandleID="k8s-pod-network.df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-csi--node--driver--v7dqp-eth0" Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.974 [INFO][3685] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:37.979733 env[1143]: 2024-04-12 18:46:37.976 [INFO][3679] k8s.go 598: Teardown processing complete. ContainerID="df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370" Apr 12 18:46:37.980763 env[1143]: time="2024-04-12T18:46:37.980715627Z" level=info msg="TearDown network for sandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" successfully" Apr 12 18:46:37.994883 env[1143]: time="2024-04-12T18:46:37.994823479Z" level=info msg="RemovePodSandbox \"df49890ecfc006e7293ecbafb0e2193cd243b94dd6b2a995c59e717e81296370\" returns successfully" Apr 12 18:46:38.360198 env[1143]: time="2024-04-12T18:46:38.359031085Z" level=info msg="StopPodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\"" Apr 12 18:46:38.371772 env[1143]: time="2024-04-12T18:46:38.371718652Z" level=info msg="StopPodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\"" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.491 [INFO][3733] k8s.go 585: Cleaning up netns ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.491 [INFO][3733] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" iface="eth0" netns="/var/run/netns/cni-c58e5c80-b4ca-1058-8b36-75e523faf4ba" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.492 [INFO][3733] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" iface="eth0" netns="/var/run/netns/cni-c58e5c80-b4ca-1058-8b36-75e523faf4ba" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.492 [INFO][3733] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" iface="eth0" netns="/var/run/netns/cni-c58e5c80-b4ca-1058-8b36-75e523faf4ba" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.492 [INFO][3733] k8s.go 592: Releasing IP address(es) ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.492 [INFO][3733] utils.go 188: Calico CNI releasing IP address ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.571 [INFO][3740] ipam_plugin.go 415: Releasing address using handleID ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.579 [INFO][3740] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.579 [INFO][3740] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.590 [WARNING][3740] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.590 [INFO][3740] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.595 [INFO][3740] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:38.598522 env[1143]: 2024-04-12 18:46:38.597 [INFO][3733] k8s.go 598: Teardown processing complete. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:46:38.611127 env[1143]: time="2024-04-12T18:46:38.598745156Z" level=info msg="TearDown network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" successfully" Apr 12 18:46:38.611127 env[1143]: time="2024-04-12T18:46:38.598789707Z" level=info msg="StopPodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" returns successfully" Apr 12 18:46:38.611127 env[1143]: time="2024-04-12T18:46:38.599590716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sr9n7,Uid:9e21d4fe-eb70-45c2-9f60-11ba5c0644fd,Namespace:kube-system,Attempt:1,}" Apr 12 18:46:38.607136 systemd[1]: run-netns-cni\x2dc58e5c80\x2db4ca\x2d1058\x2d8b36\x2d75e523faf4ba.mount: Deactivated successfully. Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.521 [INFO][3729] k8s.go 585: Cleaning up netns ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.522 [INFO][3729] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" iface="eth0" netns="/var/run/netns/cni-5a339317-36ce-d143-5292-e0edb1612cfa" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.522 [INFO][3729] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" iface="eth0" netns="/var/run/netns/cni-5a339317-36ce-d143-5292-e0edb1612cfa" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.523 [INFO][3729] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" iface="eth0" netns="/var/run/netns/cni-5a339317-36ce-d143-5292-e0edb1612cfa" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.525 [INFO][3729] k8s.go 592: Releasing IP address(es) ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.525 [INFO][3729] utils.go 188: Calico CNI releasing IP address ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.617 [INFO][3746] ipam_plugin.go 415: Releasing address using handleID ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.617 [INFO][3746] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.617 [INFO][3746] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.641 [WARNING][3746] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.641 [INFO][3746] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.643 [INFO][3746] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:38.650495 env[1143]: 2024-04-12 18:46:38.645 [INFO][3729] k8s.go 598: Teardown processing complete. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:46:38.654598 systemd[1]: run-netns-cni\x2d5a339317\x2d36ce\x2dd143\x2d5292\x2de0edb1612cfa.mount: Deactivated successfully. Apr 12 18:46:38.669292 env[1143]: time="2024-04-12T18:46:38.669218441Z" level=info msg="TearDown network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" successfully" Apr 12 18:46:38.669292 env[1143]: time="2024-04-12T18:46:38.669279630Z" level=info msg="StopPodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" returns successfully" Apr 12 18:46:38.670189 env[1143]: time="2024-04-12T18:46:38.670137214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-94tl7,Uid:488a70c9-339f-499d-bbfb-0fcd4ff1daea,Namespace:kube-system,Attempt:1,}" Apr 12 18:46:38.998994 systemd-networkd[1025]: cali29a28f6db2f: Link UP Apr 12 18:46:39.003323 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:46:39.014225 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29a28f6db2f: link becomes ready Apr 12 18:46:39.017519 systemd-networkd[1025]: cali29a28f6db2f: Gained carrier Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.851 [INFO][3770] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0 coredns-5dd5756b68- kube-system 488a70c9-339f-499d-bbfb-0fcd4ff1daea 785 0 2024-04-12 18:45:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal coredns-5dd5756b68-94tl7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali29a28f6db2f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.852 [INFO][3770] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.914 [INFO][3784] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" HandleID="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.932 [INFO][3784] ipam_plugin.go 268: Auto assigning IP ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" HandleID="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291260), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-94tl7", "timestamp":"2024-04-12 18:46:38.914684451 +0000 UTC"}, Hostname:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.932 [INFO][3784] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.932 [INFO][3784] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.932 [INFO][3784] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal' Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.937 [INFO][3784] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.946 [INFO][3784] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.951 [INFO][3784] ipam.go 489: Trying affinity for 192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.954 [INFO][3784] ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.958 [INFO][3784] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.958 [INFO][3784] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.960 [INFO][3784] ipam.go 1682: Creating new handle: k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5 Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.966 [INFO][3784] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.985 [INFO][3784] ipam.go 1216: Successfully claimed IPs: [192.168.27.3/26] block=192.168.27.0/26 handle="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.986 [INFO][3784] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.3/26] handle="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.986 [INFO][3784] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:39.051722 env[1143]: 2024-04-12 18:46:38.986 [INFO][3784] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.3/26] IPv6=[] ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" HandleID="k8s-pod-network.38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.053009 env[1143]: 2024-04-12 18:46:38.993 [INFO][3770] k8s.go 385: Populated endpoint ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"488a70c9-339f-499d-bbfb-0fcd4ff1daea", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-94tl7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali29a28f6db2f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:39.053009 env[1143]: 2024-04-12 18:46:38.993 [INFO][3770] k8s.go 386: Calico CNI using IPs: [192.168.27.3/32] ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.053009 env[1143]: 2024-04-12 18:46:38.993 [INFO][3770] dataplane_linux.go 68: Setting the host side veth name to cali29a28f6db2f ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.053009 env[1143]: 2024-04-12 18:46:39.016 [INFO][3770] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.053009 env[1143]: 2024-04-12 18:46:39.017 [INFO][3770] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"488a70c9-339f-499d-bbfb-0fcd4ff1daea", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5", Pod:"coredns-5dd5756b68-94tl7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali29a28f6db2f", MAC:"9a:51:e7:ab:c0:d8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:39.053009 env[1143]: 2024-04-12 18:46:39.049 [INFO][3770] k8s.go 498: Wrote updated endpoint to datastore ContainerID="38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5" Namespace="kube-system" Pod="coredns-5dd5756b68-94tl7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:46:39.082671 systemd-networkd[1025]: calid244f592374: Link UP Apr 12 18:46:39.092424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid244f592374: link becomes ready Apr 12 18:46:39.096609 systemd-networkd[1025]: calid244f592374: Gained carrier Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.776 [INFO][3753] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0 coredns-5dd5756b68- kube-system 9e21d4fe-eb70-45c2-9f60-11ba5c0644fd 783 0 2024-04-12 18:45:51 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal coredns-5dd5756b68-sr9n7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid244f592374 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.776 [INFO][3753] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.905 [INFO][3778] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" HandleID="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.936 [INFO][3778] ipam_plugin.go 268: Auto assigning IP ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" HandleID="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9d70), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", "pod":"coredns-5dd5756b68-sr9n7", "timestamp":"2024-04-12 18:46:38.894740489 +0000 UTC"}, Hostname:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.938 [INFO][3778] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.986 [INFO][3778] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.986 [INFO][3778] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal' Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.989 [INFO][3778] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:38.995 [INFO][3778] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.018 [INFO][3778] ipam.go 489: Trying affinity for 192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.027 [INFO][3778] ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.046 [INFO][3778] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.046 [INFO][3778] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.054 [INFO][3778] ipam.go 1682: Creating new handle: k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6 Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.060 [INFO][3778] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.070 [INFO][3778] ipam.go 1216: Successfully claimed IPs: [192.168.27.4/26] block=192.168.27.0/26 handle="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.070 [INFO][3778] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.4/26] handle="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.070 [INFO][3778] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:46:39.125607 env[1143]: 2024-04-12 18:46:39.070 [INFO][3778] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.4/26] IPv6=[] ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" HandleID="k8s-pod-network.20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.126915 env[1143]: 2024-04-12 18:46:39.073 [INFO][3753] k8s.go 385: Populated endpoint ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"", Pod:"coredns-5dd5756b68-sr9n7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid244f592374", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:39.126915 env[1143]: 2024-04-12 18:46:39.073 [INFO][3753] k8s.go 386: Calico CNI using IPs: [192.168.27.4/32] ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.126915 env[1143]: 2024-04-12 18:46:39.073 [INFO][3753] dataplane_linux.go 68: Setting the host side veth name to calid244f592374 ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.126915 env[1143]: 2024-04-12 18:46:39.110 [INFO][3753] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.126915 env[1143]: 2024-04-12 18:46:39.111 [INFO][3753] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd", ResourceVersion:"783", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6", Pod:"coredns-5dd5756b68-sr9n7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid244f592374", MAC:"5a:30:dc:11:1c:bf", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:46:39.126915 env[1143]: 2024-04-12 18:46:39.122 [INFO][3753] k8s.go 498: Wrote updated endpoint to datastore ContainerID="20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6" Namespace="kube-system" Pod="coredns-5dd5756b68-sr9n7" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:46:39.167943 env[1143]: time="2024-04-12T18:46:39.167850798Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:39.168162 env[1143]: time="2024-04-12T18:46:39.167955386Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:39.168162 env[1143]: time="2024-04-12T18:46:39.167994876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:39.168336 env[1143]: time="2024-04-12T18:46:39.168201587Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5 pid=3826 runtime=io.containerd.runc.v2 Apr 12 18:46:39.178689 env[1143]: time="2024-04-12T18:46:39.178619426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:46:39.178949 env[1143]: time="2024-04-12T18:46:39.178912443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:46:39.179117 env[1143]: time="2024-04-12T18:46:39.179086795Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:46:39.179549 env[1143]: time="2024-04-12T18:46:39.179496147Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6 pid=3840 runtime=io.containerd.runc.v2 Apr 12 18:46:39.209437 systemd[1]: Started cri-containerd-38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5.scope. Apr 12 18:46:39.223588 systemd[1]: Started cri-containerd-20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6.scope. Apr 12 18:46:39.258000 audit[3824]: NETFILTER_CFG table=filter:102 family=2 entries=50 op=nft_register_chain pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:39.258000 audit[3824]: SYSCALL arch=c000003e syscall=46 success=yes exit=25632 a0=3 a1=7ffc25f77d10 a2=0 a3=7ffc25f77cfc items=0 ppid=3153 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit: BPF prog-id=166 op=LOAD Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3840 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230613637313031656661336636363861326436313363656361636533 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=3840 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230613637313031656661336636363861326436313363656361636533 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit: BPF prog-id=167 op=LOAD Apr 12 18:46:39.283000 audit[3852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0001dfce0 items=0 ppid=3840 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230613637313031656661336636363861326436313363656361636533 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.283000 audit: BPF prog-id=168 op=LOAD Apr 12 18:46:39.283000 audit[3852]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c0001dfd28 items=0 ppid=3840 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230613637313031656661336636363861326436313363656361636533 Apr 12 18:46:39.284000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:46:39.284000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { perfmon } for pid=3852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit[3852]: AVC avc: denied { bpf } for pid=3852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.284000 audit: BPF prog-id=169 op=LOAD Apr 12 18:46:39.284000 audit[3852]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c0003de138 items=0 ppid=3840 pid=3852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230613637313031656661336636363861326436313363656361636533 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.298000 audit: BPF prog-id=170 op=LOAD Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3826 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666132393564336366346562653537396165613833383736643032 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3826 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666132393564336366346562653537396165613833383736643032 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit: BPF prog-id=171 op=LOAD Apr 12 18:46:39.299000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00034cad0 items=0 ppid=3826 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666132393564336366346562653537396165613833383736643032 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit: BPF prog-id=172 op=LOAD Apr 12 18:46:39.299000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00034cb18 items=0 ppid=3826 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666132393564336366346562653537396165613833383736643032 Apr 12 18:46:39.299000 audit: BPF prog-id=172 op=UNLOAD Apr 12 18:46:39.299000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.299000 audit: BPF prog-id=173 op=LOAD Apr 12 18:46:39.299000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00034cf28 items=0 ppid=3826 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338666132393564336366346562653537396165613833383736643032 Apr 12 18:46:39.372415 env[1143]: time="2024-04-12T18:46:39.372355196Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-sr9n7,Uid:9e21d4fe-eb70-45c2-9f60-11ba5c0644fd,Namespace:kube-system,Attempt:1,} returns sandbox id \"20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6\"" Apr 12 18:46:39.385000 audit[3894]: NETFILTER_CFG table=filter:103 family=2 entries=34 op=nft_register_chain pid=3894 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:46:39.385000 audit[3894]: SYSCALL arch=c000003e syscall=46 success=yes exit=18204 a0=3 a1=7fff4808ad40 a2=0 a3=7fff4808ad2c items=0 ppid=3153 pid=3894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.385000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:46:39.414667 env[1143]: time="2024-04-12T18:46:39.414589453Z" level=info msg="CreateContainer within sandbox \"20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:46:39.440461 env[1143]: time="2024-04-12T18:46:39.438348198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-94tl7,Uid:488a70c9-339f-499d-bbfb-0fcd4ff1daea,Namespace:kube-system,Attempt:1,} returns sandbox id \"38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5\"" Apr 12 18:46:39.447390 env[1143]: time="2024-04-12T18:46:39.447337110Z" level=info msg="CreateContainer within sandbox \"38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:46:39.479250 env[1143]: time="2024-04-12T18:46:39.479186819Z" level=info msg="CreateContainer within sandbox \"20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b25a03088968db1c5fc6d76c317afb65b9b09d117bc0edc59f2be7af4414cd78\"" Apr 12 18:46:39.481058 env[1143]: time="2024-04-12T18:46:39.481015959Z" level=info msg="StartContainer for \"b25a03088968db1c5fc6d76c317afb65b9b09d117bc0edc59f2be7af4414cd78\"" Apr 12 18:46:39.490227 env[1143]: time="2024-04-12T18:46:39.490174391Z" level=info msg="CreateContainer within sandbox \"38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8ba8d5649ffad5965a31f4b4f76a867517e61e9d0548a0b8b76c9e3c08fe8a0b\"" Apr 12 18:46:39.491082 env[1143]: time="2024-04-12T18:46:39.491047839Z" level=info msg="StartContainer for \"8ba8d5649ffad5965a31f4b4f76a867517e61e9d0548a0b8b76c9e3c08fe8a0b\"" Apr 12 18:46:39.527218 systemd[1]: Started cri-containerd-8ba8d5649ffad5965a31f4b4f76a867517e61e9d0548a0b8b76c9e3c08fe8a0b.scope. Apr 12 18:46:39.542993 systemd[1]: Started cri-containerd-b25a03088968db1c5fc6d76c317afb65b9b09d117bc0edc59f2be7af4414cd78.scope. Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.579000 audit: BPF prog-id=174 op=LOAD Apr 12 18:46:39.582000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.582000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3826 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613864353634396666616435393635613331663462346637366138 Apr 12 18:46:39.582000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.582000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3826 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613864353634396666616435393635613331663462346637366138 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.583000 audit: BPF prog-id=175 op=LOAD Apr 12 18:46:39.583000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00033c490 items=0 ppid=3826 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613864353634396666616435393635613331663462346637366138 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.584000 audit: BPF prog-id=176 op=LOAD Apr 12 18:46:39.584000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00033c4d8 items=0 ppid=3826 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613864353634396666616435393635613331663462346637366138 Apr 12 18:46:39.585000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:46:39.585000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { perfmon } for pid=3921 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit[3921]: AVC avc: denied { bpf } for pid=3921 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.586000 audit: BPF prog-id=177 op=LOAD Apr 12 18:46:39.586000 audit[3921]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00033c8e8 items=0 ppid=3826 pid=3921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862613864353634396666616435393635613331663462346637366138 Apr 12 18:46:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.624000 audit: BPF prog-id=178 op=LOAD Apr 12 18:46:39.625000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.625000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3840 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232356130333038383936386462316335666336643736633331376166 Apr 12 18:46:39.625000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.625000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3840 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232356130333038383936386462316335666336643736633331376166 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.626000 audit: BPF prog-id=179 op=LOAD Apr 12 18:46:39.626000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218860 items=0 ppid=3840 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232356130333038383936386462316335666336643736633331376166 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit: BPF prog-id=180 op=LOAD Apr 12 18:46:39.628000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002188a8 items=0 ppid=3840 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232356130333038383936386462316335666336643736633331376166 Apr 12 18:46:39.628000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:46:39.628000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:39.628000 audit: BPF prog-id=181 op=LOAD Apr 12 18:46:39.628000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218cb8 items=0 ppid=3840 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232356130333038383936386462316335666336643736633331376166 Apr 12 18:46:39.664124 env[1143]: time="2024-04-12T18:46:39.664059558Z" level=info msg="StartContainer for \"8ba8d5649ffad5965a31f4b4f76a867517e61e9d0548a0b8b76c9e3c08fe8a0b\" returns successfully" Apr 12 18:46:39.679898 env[1143]: time="2024-04-12T18:46:39.679837863Z" level=info msg="StartContainer for \"b25a03088968db1c5fc6d76c317afb65b9b09d117bc0edc59f2be7af4414cd78\" returns successfully" Apr 12 18:46:39.798531 kubelet[2082]: I0412 18:46:39.798383 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-sr9n7" podStartSLOduration=48.798295399 podCreationTimestamp="2024-04-12 18:45:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:46:39.719697514 +0000 UTC m=+62.605556385" watchObservedRunningTime="2024-04-12 18:46:39.798295399 +0000 UTC m=+62.684154271" Apr 12 18:46:39.884000 audit[3980]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:39.884000 audit[3980]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd1b725e00 a2=0 a3=7ffd1b725dec items=0 ppid=2228 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:39.887000 audit[3980]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3980 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:39.887000 audit[3980]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd1b725e00 a2=0 a3=0 items=0 ppid=2228 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:39.905000 audit[3982]: NETFILTER_CFG table=filter:106 family=2 entries=14 op=nft_register_rule pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:39.905000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc85e339f0 a2=0 a3=7ffc85e339dc items=0 ppid=2228 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:39.908000 audit[3982]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:39.908000 audit[3982]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc85e339f0 a2=0 a3=0 items=0 ppid=2228 pid=3982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:39.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.189599 env[1143]: time="2024-04-12T18:46:40.189545070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:40.193181 env[1143]: time="2024-04-12T18:46:40.193122384Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:40.195405 env[1143]: time="2024-04-12T18:46:40.195368192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:40.199412 env[1143]: time="2024-04-12T18:46:40.199359412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:46:40.203349 env[1143]: time="2024-04-12T18:46:40.202019225Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:46:40.225675 env[1143]: time="2024-04-12T18:46:40.225620022Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:40.229066 systemd-networkd[1025]: calid244f592374: Gained IPv6LL Apr 12 18:46:40.232393 env[1143]: time="2024-04-12T18:46:40.231669706Z" level=info msg="CreateContainer within sandbox \"ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:46:40.257572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3892302402.mount: Deactivated successfully. Apr 12 18:46:40.264709 env[1143]: time="2024-04-12T18:46:40.264644177Z" level=info msg="CreateContainer within sandbox \"ead6d2bf5bf85ffd9d2789df72c287a53e38255b56ad1e6b10248a2b26203a28\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051\"" Apr 12 18:46:40.265718 env[1143]: time="2024-04-12T18:46:40.265675905Z" level=info msg="StartContainer for \"f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051\"" Apr 12 18:46:40.295005 systemd[1]: Started cri-containerd-f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051.scope. Apr 12 18:46:40.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.332000 audit: BPF prog-id=182 op=LOAD Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3446 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633664373465366463333439616664376465313531326134613232 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3446 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633664373465366463333439616664376465313531326134613232 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit: BPF prog-id=183 op=LOAD Apr 12 18:46:40.333000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003c8460 items=0 ppid=3446 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633664373465366463333439616664376465313531326134613232 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit: BPF prog-id=184 op=LOAD Apr 12 18:46:40.333000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003c84a8 items=0 ppid=3446 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633664373465366463333439616664376465313531326134613232 Apr 12 18:46:40.333000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:46:40.333000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { perfmon } for pid=3992 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit[3992]: AVC avc: denied { bpf } for pid=3992 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:40.333000 audit: BPF prog-id=185 op=LOAD Apr 12 18:46:40.333000 audit[3992]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c88b8 items=0 ppid=3446 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.333000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631633664373465366463333439616664376465313531326134613232 Apr 12 18:46:40.400280 env[1143]: time="2024-04-12T18:46:40.400059689Z" level=info msg="StartContainer for \"f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051\" returns successfully" Apr 12 18:46:40.725456 kubelet[2082]: I0412 18:46:40.725415 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-65c84588db-r2hlv" podStartSLOduration=25.732798224 podCreationTimestamp="2024-04-12 18:46:10 +0000 UTC" firstStartedPulling="2024-04-12 18:46:35.207466865 +0000 UTC m=+58.093325710" lastFinishedPulling="2024-04-12 18:46:40.199947424 +0000 UTC m=+63.085806274" observedRunningTime="2024-04-12 18:46:40.723192262 +0000 UTC m=+63.609051131" watchObservedRunningTime="2024-04-12 18:46:40.725278788 +0000 UTC m=+63.611137666" Apr 12 18:46:40.725872 kubelet[2082]: I0412 18:46:40.725782 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-94tl7" podStartSLOduration=49.725748311 podCreationTimestamp="2024-04-12 18:45:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:46:39.805148887 +0000 UTC m=+62.691007758" watchObservedRunningTime="2024-04-12 18:46:40.725748311 +0000 UTC m=+63.611607181" Apr 12 18:46:40.753577 systemd[1]: run-containerd-runc-k8s.io-f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051-runc.K3eZ1D.mount: Deactivated successfully. Apr 12 18:46:40.805128 systemd-networkd[1025]: cali29a28f6db2f: Gained IPv6LL Apr 12 18:46:40.931000 audit[4042]: NETFILTER_CFG table=filter:108 family=2 entries=11 op=nft_register_rule pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:40.931000 audit[4042]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd6bd50940 a2=0 a3=7ffd6bd5092c items=0 ppid=2228 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.931000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:40.942000 audit[4042]: NETFILTER_CFG table=nat:109 family=2 entries=47 op=nft_register_chain pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:46:40.942000 audit[4042]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd6bd50940 a2=0 a3=7ffd6bd5092c items=0 ppid=2228 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:40.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:46:41.603470 systemd[1]: run-containerd-runc-k8s.io-4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a-runc.cbKtOA.mount: Deactivated successfully. Apr 12 18:46:41.787823 env[1143]: time="2024-04-12T18:46:41.787767573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.792709 env[1143]: time="2024-04-12T18:46:41.792659074Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.797045 env[1143]: time="2024-04-12T18:46:41.796993042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.801328 env[1143]: time="2024-04-12T18:46:41.801261127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:46:41.802697 env[1143]: time="2024-04-12T18:46:41.802645374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:46:41.806285 env[1143]: time="2024-04-12T18:46:41.806247038Z" level=info msg="CreateContainer within sandbox \"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:46:41.832460 env[1143]: time="2024-04-12T18:46:41.832336848Z" level=info msg="CreateContainer within sandbox \"78d213feed9240c9483a4c42f235590d5df635f56636208f66ecb0d3f4260115\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"bcff99f171c62c27ce6a436a3450e68063f545837d13f12e4b21432e12aee57e\"" Apr 12 18:46:41.833819 env[1143]: time="2024-04-12T18:46:41.833774596Z" level=info msg="StartContainer for \"bcff99f171c62c27ce6a436a3450e68063f545837d13f12e4b21432e12aee57e\"" Apr 12 18:46:41.886006 systemd[1]: Started cri-containerd-bcff99f171c62c27ce6a436a3450e68063f545837d13f12e4b21432e12aee57e.scope. Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.939324 kernel: kauditd_printk_skb: 353 callbacks suppressed Apr 12 18:46:41.939433 kernel: audit: type=1400 audit(1712947601.932:1371): avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fad78650768 items=0 ppid=3486 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.998380 kernel: audit: type=1300 audit(1712947601.932:1371): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fad78650768 items=0 ppid=3486 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:42.009673 env[1143]: time="2024-04-12T18:46:42.009613370Z" level=info msg="StartContainer for \"bcff99f171c62c27ce6a436a3450e68063f545837d13f12e4b21432e12aee57e\" returns successfully" Apr 12 18:46:41.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666639396631373163363263323763653661343336613334353065 Apr 12 18:46:42.039339 kernel: audit: type=1327 audit(1712947601.932:1371): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666639396631373163363263323763653661343336613334353065 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.081403 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.081577 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.103426 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.125573 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.147207 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.191017 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:42.191156 kernel: audit: type=1400 audit(1712947601.932:1372): avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.932000 audit: BPF prog-id=186 op=LOAD Apr 12 18:46:41.932000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00035fea8 items=0 ppid=3486 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666639396631373163363263323763653661343336613334353065 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit: BPF prog-id=187 op=LOAD Apr 12 18:46:41.959000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00035fef8 items=0 ppid=3486 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666639396631373163363263323763653661343336613334353065 Apr 12 18:46:41.959000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:46:41.959000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { perfmon } for pid=4075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit[4075]: AVC avc: denied { bpf } for pid=4075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:46:41.959000 audit: BPF prog-id=188 op=LOAD Apr 12 18:46:41.959000 audit[4075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00035ff88 items=0 ppid=3486 pid=4075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:41.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263666639396631373163363263323763653661343336613334353065 Apr 12 18:46:42.564975 kubelet[2082]: I0412 18:46:42.564843 2082 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:46:42.564975 kubelet[2082]: I0412 18:46:42.564893 2082 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:46:42.732378 kubelet[2082]: I0412 18:46:42.732332 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-v7dqp" podStartSLOduration=26.085097322 podCreationTimestamp="2024-04-12 18:46:10 +0000 UTC" firstStartedPulling="2024-04-12 18:46:35.156849055 +0000 UTC m=+58.042707917" lastFinishedPulling="2024-04-12 18:46:41.804011414 +0000 UTC m=+64.689870278" observedRunningTime="2024-04-12 18:46:42.728392491 +0000 UTC m=+65.614251363" watchObservedRunningTime="2024-04-12 18:46:42.732259683 +0000 UTC m=+65.618118553" Apr 12 18:46:42.766191 systemd[1]: Started sshd@8-10.128.0.9:22-139.178.89.65:47394.service. Apr 12 18:46:42.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.9:22-139.178.89.65:47394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:43.113000 audit[4106]: USER_ACCT pid=4106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:43.116138 sshd[4106]: Accepted publickey for core from 139.178.89.65 port 47394 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:43.115000 audit[4106]: CRED_ACQ pid=4106 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:43.115000 audit[4106]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8a31d730 a2=3 a3=0 items=0 ppid=1 pid=4106 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:43.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:43.117250 sshd[4106]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:43.123898 systemd-logind[1132]: New session 9 of user core. Apr 12 18:46:43.124788 systemd[1]: Started session-9.scope. Apr 12 18:46:43.135000 audit[4106]: USER_START pid=4106 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:43.138000 audit[4114]: CRED_ACQ pid=4114 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:43.472198 sshd[4106]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:43.472000 audit[4106]: USER_END pid=4106 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:43.472000 audit[4106]: CRED_DISP pid=4106 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:43.476681 systemd-logind[1132]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:46:43.477169 systemd[1]: sshd@8-10.128.0.9:22-139.178.89.65:47394.service: Deactivated successfully. Apr 12 18:46:43.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.9:22-139.178.89.65:47394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:43.478810 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:46:43.480355 systemd-logind[1132]: Removed session 9. Apr 12 18:46:48.527686 systemd[1]: Started sshd@9-10.128.0.9:22-139.178.89.65:56444.service. Apr 12 18:46:48.559170 kernel: kauditd_printk_skb: 44 callbacks suppressed Apr 12 18:46:48.559354 kernel: audit: type=1130 audit(1712947608.527:1386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.9:22-139.178.89.65:56444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:48.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.9:22-139.178.89.65:56444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:48.877000 audit[4133]: USER_ACCT pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:48.908215 sshd[4133]: Accepted publickey for core from 139.178.89.65 port 56444 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:48.908689 kernel: audit: type=1101 audit(1712947608.877:1387): pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:48.906000 audit[4133]: CRED_ACQ pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:48.909050 sshd[4133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:48.917806 systemd[1]: Started session-10.scope. Apr 12 18:46:48.919624 systemd-logind[1132]: New session 10 of user core. Apr 12 18:46:48.951122 kernel: audit: type=1103 audit(1712947608.906:1388): pid=4133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:48.951379 kernel: audit: type=1006 audit(1712947608.907:1389): pid=4133 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:46:48.951443 kernel: audit: type=1300 audit(1712947608.907:1389): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec684a6b0 a2=3 a3=0 items=0 ppid=1 pid=4133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:48.907000 audit[4133]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec684a6b0 a2=3 a3=0 items=0 ppid=1 pid=4133 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:48.907000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:48.988772 kernel: audit: type=1327 audit(1712947608.907:1389): proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:48.988926 kernel: audit: type=1105 audit(1712947608.930:1390): pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:48.930000 audit[4133]: USER_START pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.021403 kernel: audit: type=1103 audit(1712947608.934:1391): pid=4135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:48.934000 audit[4135]: CRED_ACQ pid=4135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.214446 sshd[4133]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:49.215000 audit[4133]: USER_END pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.227854 systemd[1]: sshd@9-10.128.0.9:22-139.178.89.65:56444.service: Deactivated successfully. Apr 12 18:46:49.229075 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:46:49.232372 systemd-logind[1132]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:46:49.234086 systemd-logind[1132]: Removed session 10. Apr 12 18:46:49.215000 audit[4133]: CRED_DISP pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.273749 kernel: audit: type=1106 audit(1712947609.215:1392): pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.273896 kernel: audit: type=1104 audit(1712947609.215:1393): pid=4133 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.9:22-139.178.89.65:56444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:49.282963 systemd[1]: Started sshd@10-10.128.0.9:22-139.178.89.65:56458.service. Apr 12 18:46:49.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.9:22-139.178.89.65:56458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:49.624000 audit[4146]: USER_ACCT pid=4146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.626715 sshd[4146]: Accepted publickey for core from 139.178.89.65 port 56458 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:49.626000 audit[4146]: CRED_ACQ pid=4146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.626000 audit[4146]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff28b92a80 a2=3 a3=0 items=0 ppid=1 pid=4146 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:49.626000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:49.628270 sshd[4146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:49.635315 systemd[1]: Started session-11.scope. Apr 12 18:46:49.635928 systemd-logind[1132]: New session 11 of user core. Apr 12 18:46:49.644000 audit[4146]: USER_START pid=4146 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:49.646000 audit[4150]: CRED_ACQ pid=4150 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.167899 sshd[4146]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:50.169000 audit[4146]: USER_END pid=4146 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.169000 audit[4146]: CRED_DISP pid=4146 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.173134 systemd-logind[1132]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:46:50.173617 systemd[1]: sshd@10-10.128.0.9:22-139.178.89.65:56458.service: Deactivated successfully. Apr 12 18:46:50.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.9:22-139.178.89.65:56458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:50.174940 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:46:50.176483 systemd-logind[1132]: Removed session 11. Apr 12 18:46:50.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.9:22-139.178.89.65:56460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:50.225140 systemd[1]: Started sshd@11-10.128.0.9:22-139.178.89.65:56460.service. Apr 12 18:46:50.332000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:50.332000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:50.332000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000717fe0 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:46:50.332000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:46:50.332000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:50.332000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db5600 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:46:50.332000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:46:50.332000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000c41be0 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:46:50.332000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:46:50.335000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:46:50.335000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000db5920 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:46:50.335000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:46:50.577000 audit[4159]: USER_ACCT pid=4159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.578894 sshd[4159]: Accepted publickey for core from 139.178.89.65 port 56460 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:50.579000 audit[4159]: CRED_ACQ pid=4159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.579000 audit[4159]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca3e9f7c0 a2=3 a3=0 items=0 ppid=1 pid=4159 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:50.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:50.581161 sshd[4159]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:50.588364 systemd-logind[1132]: New session 12 of user core. Apr 12 18:46:50.588504 systemd[1]: Started session-12.scope. Apr 12 18:46:50.595000 audit[4159]: USER_START pid=4159 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.598000 audit[4161]: CRED_ACQ pid=4161 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.920034 sshd[4159]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:50.920000 audit[4159]: USER_END pid=4159 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.921000 audit[4159]: CRED_DISP pid=4159 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:50.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.9:22-139.178.89.65:56460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:50.924566 systemd[1]: sshd@11-10.128.0.9:22-139.178.89.65:56460.service: Deactivated successfully. Apr 12 18:46:50.925789 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:46:50.927819 systemd-logind[1132]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:46:50.929581 systemd-logind[1132]: Removed session 12. Apr 12 18:46:52.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.9:22-43.155.138.135:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:52.273046 systemd[1]: Started sshd@12-10.128.0.9:22-43.155.138.135:57714.service. Apr 12 18:46:52.815261 systemd[1]: run-containerd-runc-k8s.io-f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051-runc.viSQ5y.mount: Deactivated successfully. Apr 12 18:46:53.246000 audit[4171]: USER_AUTH pid=4171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.155.138.135 addr=43.155.138.135 terminal=ssh res=failed' Apr 12 18:46:53.247614 sshd[4171]: Failed password for root from 43.155.138.135 port 57714 ssh2 Apr 12 18:46:53.429664 sshd[4171]: Received disconnect from 43.155.138.135 port 57714:11: Bye Bye [preauth] Apr 12 18:46:53.429886 sshd[4171]: Disconnected from authenticating user root 43.155.138.135 port 57714 [preauth] Apr 12 18:46:53.431455 systemd[1]: sshd@12-10.128.0.9:22-43.155.138.135:57714.service: Deactivated successfully. Apr 12 18:46:53.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.9:22-43.155.138.135:57714 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:56.005706 kernel: kauditd_printk_skb: 38 callbacks suppressed Apr 12 18:46:56.005887 kernel: audit: type=1130 audit(1712947615.975:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.9:22-139.178.89.65:56476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:55.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.9:22-139.178.89.65:56476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:46:55.975259 systemd[1]: Started sshd@13-10.128.0.9:22-139.178.89.65:56476.service. Apr 12 18:46:56.324000 audit[4211]: USER_ACCT pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.356908 sshd[4211]: Accepted publickey for core from 139.178.89.65 port 56476 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:46:56.357343 kernel: audit: type=1101 audit(1712947616.324:1421): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.358603 sshd[4211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:46:56.367196 systemd-logind[1132]: New session 13 of user core. Apr 12 18:46:56.368384 systemd[1]: Started session-13.scope. Apr 12 18:46:56.357000 audit[4211]: CRED_ACQ pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.405407 kernel: audit: type=1103 audit(1712947616.357:1422): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.424351 kernel: audit: type=1006 audit(1712947616.357:1423): pid=4211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:46:56.424502 kernel: audit: type=1300 audit(1712947616.357:1423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8463aac0 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.357000 audit[4211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8463aac0 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:46:56.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:56.462265 kernel: audit: type=1327 audit(1712947616.357:1423): proctitle=737368643A20636F7265205B707269765D Apr 12 18:46:56.462465 kernel: audit: type=1105 audit(1712947616.378:1424): pid=4211 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.378000 audit[4211]: USER_START pid=4211 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.385000 audit[4213]: CRED_ACQ pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.518926 kernel: audit: type=1103 audit(1712947616.385:1425): pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.672179 systemd[1]: run-containerd-runc-k8s.io-f1c6d74e6dc349afd7de1512a4a22139b2dbb8fe2f1625daf5d7b12e97be4051-runc.zdkraS.mount: Deactivated successfully. Apr 12 18:46:56.725852 sshd[4211]: pam_unix(sshd:session): session closed for user core Apr 12 18:46:56.728000 audit[4211]: USER_END pid=4211 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.732710 systemd[1]: sshd@13-10.128.0.9:22-139.178.89.65:56476.service: Deactivated successfully. Apr 12 18:46:56.734046 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:46:56.736111 systemd-logind[1132]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:46:56.737904 systemd-logind[1132]: Removed session 13. Apr 12 18:46:56.728000 audit[4211]: CRED_DISP pid=4211 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.786365 kernel: audit: type=1106 audit(1712947616.728:1426): pid=4211 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.786550 kernel: audit: type=1104 audit(1712947616.728:1427): pid=4211 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:46:56.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.9:22-139.178.89.65:56476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:01.783623 systemd[1]: Started sshd@14-10.128.0.9:22-139.178.89.65:41598.service. Apr 12 18:47:01.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.9:22-139.178.89.65:41598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:01.789866 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:47:01.789994 kernel: audit: type=1130 audit(1712947621.783:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.9:22-139.178.89.65:41598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:02.137000 audit[4246]: USER_ACCT pid=4246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.169627 kernel: audit: type=1101 audit(1712947622.137:1430): pid=4246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.169685 sshd[4246]: Accepted publickey for core from 139.178.89.65 port 41598 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:02.170451 sshd[4246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:02.168000 audit[4246]: CRED_ACQ pid=4246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.179818 systemd[1]: Started session-14.scope. Apr 12 18:47:02.182621 systemd-logind[1132]: New session 14 of user core. Apr 12 18:47:02.213019 kernel: audit: type=1103 audit(1712947622.168:1431): pid=4246 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.213227 kernel: audit: type=1006 audit(1712947622.168:1432): pid=4246 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:47:02.213278 kernel: audit: type=1300 audit(1712947622.168:1432): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb92e44e0 a2=3 a3=0 items=0 ppid=1 pid=4246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:02.168000 audit[4246]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb92e44e0 a2=3 a3=0 items=0 ppid=1 pid=4246 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:02.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:02.251241 kernel: audit: type=1327 audit(1712947622.168:1432): proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:02.251524 kernel: audit: type=1105 audit(1712947622.192:1433): pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.192000 audit[4246]: USER_START pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.195000 audit[4248]: CRED_ACQ pid=4248 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.309357 kernel: audit: type=1103 audit(1712947622.195:1434): pid=4248 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.483366 sshd[4246]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:02.484000 audit[4246]: USER_END pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.489808 systemd-logind[1132]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:47:02.492508 systemd[1]: sshd@14-10.128.0.9:22-139.178.89.65:41598.service: Deactivated successfully. Apr 12 18:47:02.493725 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:47:02.496224 systemd-logind[1132]: Removed session 14. Apr 12 18:47:02.484000 audit[4246]: CRED_DISP pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.519342 kernel: audit: type=1106 audit(1712947622.484:1435): pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.519413 kernel: audit: type=1104 audit(1712947622.484:1436): pid=4246 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:02.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.9:22-139.178.89.65:41598 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.9:22-139.178.89.65:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.540886 systemd[1]: Started sshd@15-10.128.0.9:22-139.178.89.65:46260.service. Apr 12 18:47:07.546747 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:47:07.546851 kernel: audit: type=1130 audit(1712947627.540:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.9:22-139.178.89.65:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:07.924524 kernel: audit: type=1101 audit(1712947627.893:1439): pid=4263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:07.893000 audit[4263]: USER_ACCT pid=4263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:07.925028 sshd[4263]: Accepted publickey for core from 139.178.89.65 port 46260 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:07.923000 audit[4263]: CRED_ACQ pid=4263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:07.925956 sshd[4263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:07.937923 systemd[1]: Started session-15.scope. Apr 12 18:47:07.939386 systemd-logind[1132]: New session 15 of user core. Apr 12 18:47:07.952342 kernel: audit: type=1103 audit(1712947627.923:1440): pid=4263 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:07.974355 kernel: audit: type=1006 audit(1712947627.923:1441): pid=4263 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:47:07.974538 kernel: audit: type=1300 audit(1712947627.923:1441): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9cf6bc80 a2=3 a3=0 items=0 ppid=1 pid=4263 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.923000 audit[4263]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9cf6bc80 a2=3 a3=0 items=0 ppid=1 pid=4263 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:07.999354 kernel: audit: type=1327 audit(1712947627.923:1441): proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:07.923000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:07.945000 audit[4263]: USER_START pid=4263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:07.962000 audit[4266]: CRED_ACQ pid=4266 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.069718 kernel: audit: type=1105 audit(1712947627.945:1442): pid=4263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.069902 kernel: audit: type=1103 audit(1712947627.962:1443): pid=4266 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.288701 sshd[4263]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:08.289000 audit[4263]: USER_END pid=4263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.323340 kernel: audit: type=1106 audit(1712947628.289:1444): pid=4263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.290000 audit[4263]: CRED_DISP pid=4263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.325430 systemd[1]: sshd@15-10.128.0.9:22-139.178.89.65:46260.service: Deactivated successfully. Apr 12 18:47:08.326735 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:47:08.329294 systemd-logind[1132]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:47:08.330883 systemd-logind[1132]: Removed session 15. Apr 12 18:47:08.349015 kernel: audit: type=1104 audit(1712947628.290:1445): pid=4263 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.9:22-139.178.89.65:46260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.355611 systemd[1]: Started sshd@16-10.128.0.9:22-139.178.89.65:46270.service. Apr 12 18:47:08.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.9:22-139.178.89.65:46270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:08.699000 audit[4276]: USER_ACCT pid=4276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.702412 sshd[4276]: Accepted publickey for core from 139.178.89.65 port 46270 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:08.701000 audit[4276]: CRED_ACQ pid=4276 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.701000 audit[4276]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1c391000 a2=3 a3=0 items=0 ppid=1 pid=4276 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:08.701000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:08.703445 sshd[4276]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:08.711034 systemd[1]: Started session-16.scope. Apr 12 18:47:08.711716 systemd-logind[1132]: New session 16 of user core. Apr 12 18:47:08.718000 audit[4276]: USER_START pid=4276 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:08.721000 audit[4278]: CRED_ACQ pid=4278 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:09.098524 sshd[4276]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:09.099000 audit[4276]: USER_END pid=4276 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:09.099000 audit[4276]: CRED_DISP pid=4276 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:09.103837 systemd[1]: sshd@16-10.128.0.9:22-139.178.89.65:46270.service: Deactivated successfully. Apr 12 18:47:09.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.9:22-139.178.89.65:46270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.105117 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:47:09.106261 systemd-logind[1132]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:47:09.107628 systemd-logind[1132]: Removed session 16. Apr 12 18:47:09.156916 systemd[1]: Started sshd@17-10.128.0.9:22-139.178.89.65:46276.service. Apr 12 18:47:09.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.9:22-139.178.89.65:46276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:09.511000 audit[4285]: USER_ACCT pid=4285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:09.513659 sshd[4285]: Accepted publickey for core from 139.178.89.65 port 46276 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:09.514000 audit[4285]: CRED_ACQ pid=4285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:09.514000 audit[4285]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffadabaaa0 a2=3 a3=0 items=0 ppid=1 pid=4285 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:09.514000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:09.516413 sshd[4285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:09.523531 systemd[1]: Started session-17.scope. Apr 12 18:47:09.524495 systemd-logind[1132]: New session 17 of user core. Apr 12 18:47:09.531000 audit[4285]: USER_START pid=4285 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:09.533000 audit[4288]: CRED_ACQ pid=4288 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:10.641000 audit[4298]: NETFILTER_CFG table=filter:110 family=2 entries=20 op=nft_register_rule pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.641000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff5b294f40 a2=0 a3=7fff5b294f2c items=0 ppid=2228 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.648000 audit[4298]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.648000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff5b294f40 a2=0 a3=0 items=0 ppid=2228 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.683649 sshd[4285]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:10.684000 audit[4285]: USER_END pid=4285 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:10.684000 audit[4285]: CRED_DISP pid=4285 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:10.689280 systemd-logind[1132]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:47:10.689783 systemd[1]: sshd@17-10.128.0.9:22-139.178.89.65:46276.service: Deactivated successfully. Apr 12 18:47:10.690994 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:47:10.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.9:22-139.178.89.65:46276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:10.692898 systemd-logind[1132]: Removed session 17. Apr 12 18:47:10.706000 audit[4301]: NETFILTER_CFG table=filter:112 family=2 entries=32 op=nft_register_rule pid=4301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.706000 audit[4301]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffecc5e5100 a2=0 a3=7ffecc5e50ec items=0 ppid=2228 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.706000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.708000 audit[4301]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4301 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:10.708000 audit[4301]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffecc5e5100 a2=0 a3=0 items=0 ppid=2228 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:10.708000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:10.739345 systemd[1]: Started sshd@18-10.128.0.9:22-139.178.89.65:46282.service. Apr 12 18:47:10.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.9:22-139.178.89.65:46282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:11.047640 systemd[1]: run-containerd-runc-k8s.io-4e0bb1f35c006d19010c39d6d3b121692c3379ef75a3033e9a04a502f70d958a-runc.rvXcOY.mount: Deactivated successfully. Apr 12 18:47:11.117000 audit[4303]: USER_ACCT pid=4303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:11.120823 sshd[4303]: Accepted publickey for core from 139.178.89.65 port 46282 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:11.120000 audit[4303]: CRED_ACQ pid=4303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:11.120000 audit[4303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe45558a0 a2=3 a3=0 items=0 ppid=1 pid=4303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:11.120000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:11.123071 sshd[4303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:11.132578 systemd[1]: Started session-18.scope. Apr 12 18:47:11.135414 systemd-logind[1132]: New session 18 of user core. Apr 12 18:47:11.145000 audit[4303]: USER_START pid=4303 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:11.148000 audit[4325]: CRED_ACQ pid=4325 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:11.771609 sshd[4303]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:11.772000 audit[4303]: USER_END pid=4303 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:11.773000 audit[4303]: CRED_DISP pid=4303 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:11.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.9:22-139.178.89.65:46282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:11.777732 systemd[1]: sshd@18-10.128.0.9:22-139.178.89.65:46282.service: Deactivated successfully. Apr 12 18:47:11.778957 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:47:11.780133 systemd-logind[1132]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:47:11.782068 systemd-logind[1132]: Removed session 18. Apr 12 18:47:11.828623 systemd[1]: Started sshd@19-10.128.0.9:22-139.178.89.65:46296.service. Apr 12 18:47:11.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.9:22-139.178.89.65:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:12.173000 audit[4333]: USER_ACCT pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.175424 sshd[4333]: Accepted publickey for core from 139.178.89.65 port 46296 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:12.174000 audit[4333]: CRED_ACQ pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.175000 audit[4333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4f2f56d0 a2=3 a3=0 items=0 ppid=1 pid=4333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:12.175000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:12.177314 sshd[4333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:12.184752 systemd[1]: Started session-19.scope. Apr 12 18:47:12.185431 systemd-logind[1132]: New session 19 of user core. Apr 12 18:47:12.192000 audit[4333]: USER_START pid=4333 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.194000 audit[4335]: CRED_ACQ pid=4335 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.551640 sshd[4333]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:12.561379 kernel: kauditd_printk_skb: 54 callbacks suppressed Apr 12 18:47:12.561540 kernel: audit: type=1106 audit(1712947632.552:1484): pid=4333 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.552000 audit[4333]: USER_END pid=4333 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.569062 systemd[1]: sshd@19-10.128.0.9:22-139.178.89.65:46296.service: Deactivated successfully. Apr 12 18:47:12.571027 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:47:12.572453 systemd-logind[1132]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:47:12.574441 systemd-logind[1132]: Removed session 19. Apr 12 18:47:12.595350 kernel: audit: type=1104 audit(1712947632.552:1485): pid=4333 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.552000 audit[4333]: CRED_DISP pid=4333 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:12.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.9:22-139.178.89.65:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:12.640723 kernel: audit: type=1131 audit(1712947632.568:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.9:22-139.178.89.65:46296 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:17.216000 audit[4357]: NETFILTER_CFG table=filter:114 family=2 entries=20 op=nft_register_rule pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:17.268871 kernel: audit: type=1325 audit(1712947637.216:1487): table=filter:114 family=2 entries=20 op=nft_register_rule pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:17.269049 kernel: audit: type=1300 audit(1712947637.216:1487): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdbeb5daa0 a2=0 a3=7ffdbeb5da8c items=0 ppid=2228 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.216000 audit[4357]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdbeb5daa0 a2=0 a3=7ffdbeb5da8c items=0 ppid=2228 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.216000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:17.217000 audit[4357]: NETFILTER_CFG table=nat:115 family=2 entries=104 op=nft_register_chain pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:17.302620 kernel: audit: type=1327 audit(1712947637.216:1487): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:17.302802 kernel: audit: type=1325 audit(1712947637.217:1488): table=nat:115 family=2 entries=104 op=nft_register_chain pid=4357 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:17.302849 kernel: audit: type=1300 audit(1712947637.217:1488): arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffdbeb5daa0 a2=0 a3=7ffdbeb5da8c items=0 ppid=2228 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.217000 audit[4357]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffdbeb5daa0 a2=0 a3=7ffdbeb5da8c items=0 ppid=2228 pid=4357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.217000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:17.351782 kernel: audit: type=1327 audit(1712947637.217:1488): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:17.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.9:22-139.178.89.65:46630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:17.601789 systemd[1]: Started sshd@20-10.128.0.9:22-139.178.89.65:46630.service. Apr 12 18:47:17.627355 kernel: audit: type=1130 audit(1712947637.600:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.9:22-139.178.89.65:46630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:17.950000 audit[4360]: USER_ACCT pid=4360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:17.954028 sshd[4360]: Accepted publickey for core from 139.178.89.65 port 46630 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:17.981000 audit[4360]: CRED_ACQ pid=4360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:17.984107 sshd[4360]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:17.992783 systemd[1]: Started session-20.scope. Apr 12 18:47:17.993756 systemd-logind[1132]: New session 20 of user core. Apr 12 18:47:18.008912 kernel: audit: type=1101 audit(1712947637.950:1490): pid=4360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.009052 kernel: audit: type=1103 audit(1712947637.981:1491): pid=4360 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.009110 kernel: audit: type=1006 audit(1712947637.982:1492): pid=4360 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 18:47:18.033059 kernel: audit: type=1300 audit(1712947637.982:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff18315320 a2=3 a3=0 items=0 ppid=1 pid=4360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:17.982000 audit[4360]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff18315320 a2=3 a3=0 items=0 ppid=1 pid=4360 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:18.056402 kernel: audit: type=1327 audit(1712947637.982:1492): proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:17.982000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:18.005000 audit[4360]: USER_START pid=4360 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.098367 kernel: audit: type=1105 audit(1712947638.005:1493): pid=4360 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.098568 kernel: audit: type=1103 audit(1712947638.008:1494): pid=4362 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.008000 audit[4362]: CRED_ACQ pid=4362 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.310474 sshd[4360]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:18.312000 audit[4360]: USER_END pid=4360 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.316319 systemd[1]: sshd@20-10.128.0.9:22-139.178.89.65:46630.service: Deactivated successfully. Apr 12 18:47:18.317546 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:47:18.319682 systemd-logind[1132]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:47:18.321135 systemd-logind[1132]: Removed session 20. Apr 12 18:47:18.346486 kernel: audit: type=1106 audit(1712947638.312:1495): pid=4360 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.346696 kernel: audit: type=1104 audit(1712947638.312:1496): pid=4360 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.312000 audit[4360]: CRED_DISP pid=4360 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:18.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.9:22-139.178.89.65:46630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:23.366661 systemd[1]: Started sshd@21-10.128.0.9:22-139.178.89.65:46640.service. Apr 12 18:47:23.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.9:22-139.178.89.65:46640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:23.373216 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:47:23.373331 kernel: audit: type=1130 audit(1712947643.367:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.9:22-139.178.89.65:46640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:23.713000 audit[4396]: USER_ACCT pid=4396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.713964 sshd[4396]: Accepted publickey for core from 139.178.89.65 port 46640 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:23.743390 kernel: audit: type=1101 audit(1712947643.713:1499): pid=4396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.743000 audit[4396]: CRED_ACQ pid=4396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.745040 sshd[4396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:23.756558 systemd[1]: Started session-21.scope. Apr 12 18:47:23.758875 systemd-logind[1132]: New session 21 of user core. Apr 12 18:47:23.770374 kernel: audit: type=1103 audit(1712947643.743:1500): pid=4396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.743000 audit[4396]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a38baf0 a2=3 a3=0 items=0 ppid=1 pid=4396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:23.788412 kernel: audit: type=1006 audit(1712947643.743:1501): pid=4396 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:47:23.788474 kernel: audit: type=1300 audit(1712947643.743:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2a38baf0 a2=3 a3=0 items=0 ppid=1 pid=4396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:23.743000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:23.768000 audit[4396]: USER_START pid=4396 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.858981 kernel: audit: type=1327 audit(1712947643.743:1501): proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:23.859184 kernel: audit: type=1105 audit(1712947643.768:1502): pid=4396 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.859322 kernel: audit: type=1103 audit(1712947643.771:1503): pid=4398 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:23.771000 audit[4398]: CRED_ACQ pid=4398 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:24.065155 sshd[4396]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:24.067000 audit[4396]: USER_END pid=4396 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:24.071876 systemd[1]: sshd@21-10.128.0.9:22-139.178.89.65:46640.service: Deactivated successfully. Apr 12 18:47:24.073132 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:47:24.075184 systemd-logind[1132]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:47:24.077073 systemd-logind[1132]: Removed session 21. Apr 12 18:47:24.067000 audit[4396]: CRED_DISP pid=4396 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:24.101608 kernel: audit: type=1106 audit(1712947644.067:1504): pid=4396 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:24.101750 kernel: audit: type=1104 audit(1712947644.067:1505): pid=4396 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:24.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.9:22-139.178.89.65:46640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:29.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.9:22-139.178.89.65:53902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:29.122925 systemd[1]: Started sshd@22-10.128.0.9:22-139.178.89.65:53902.service. Apr 12 18:47:29.128900 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:47:29.129024 kernel: audit: type=1130 audit(1712947649.123:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.9:22-139.178.89.65:53902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:29.485000 audit[4414]: USER_ACCT pid=4414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.492820 sshd[4414]: Accepted publickey for core from 139.178.89.65 port 53902 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:29.516352 kernel: audit: type=1101 audit(1712947649.485:1508): pid=4414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.516503 kernel: audit: type=1103 audit(1712947649.515:1509): pid=4414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.515000 audit[4414]: CRED_ACQ pid=4414 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.517425 sshd[4414]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:29.535321 systemd-logind[1132]: New session 22 of user core. Apr 12 18:47:29.536404 systemd[1]: Started session-22.scope. Apr 12 18:47:29.516000 audit[4414]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67d3f4b0 a2=3 a3=0 items=0 ppid=1 pid=4414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.596553 kernel: audit: type=1006 audit(1712947649.516:1510): pid=4414 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:47:29.596741 kernel: audit: type=1300 audit(1712947649.516:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67d3f4b0 a2=3 a3=0 items=0 ppid=1 pid=4414 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:29.596789 kernel: audit: type=1327 audit(1712947649.516:1510): proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:29.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:29.548000 audit[4414]: USER_START pid=4414 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.639178 kernel: audit: type=1105 audit(1712947649.548:1511): pid=4414 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.550000 audit[4416]: CRED_ACQ pid=4416 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.665356 kernel: audit: type=1103 audit(1712947649.550:1512): pid=4416 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.888939 sshd[4414]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:29.890000 audit[4414]: USER_END pid=4414 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.925384 kernel: audit: type=1106 audit(1712947649.890:1513): pid=4414 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.926896 systemd[1]: sshd@22-10.128.0.9:22-139.178.89.65:53902.service: Deactivated successfully. Apr 12 18:47:29.928470 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:47:29.930209 systemd-logind[1132]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:47:29.890000 audit[4414]: CRED_DISP pid=4414 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.956467 kernel: audit: type=1104 audit(1712947649.890:1514): pid=4414 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:29.957173 systemd-logind[1132]: Removed session 22. Apr 12 18:47:29.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.9:22-139.178.89.65:53902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:30.327378 kubelet[2082]: I0412 18:47:30.327221 2082 topology_manager.go:215] "Topology Admit Handler" podUID="397522db-c941-4fd1-b190-0203500230f0" podNamespace="calico-apiserver" podName="calico-apiserver-59b7bc967d-ccg8p" Apr 12 18:47:30.336245 systemd[1]: Created slice kubepods-besteffort-pod397522db_c941_4fd1_b190_0203500230f0.slice. Apr 12 18:47:30.372731 kubelet[2082]: I0412 18:47:30.372682 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/397522db-c941-4fd1-b190-0203500230f0-calico-apiserver-certs\") pod \"calico-apiserver-59b7bc967d-ccg8p\" (UID: \"397522db-c941-4fd1-b190-0203500230f0\") " pod="calico-apiserver/calico-apiserver-59b7bc967d-ccg8p" Apr 12 18:47:30.372731 kubelet[2082]: I0412 18:47:30.372749 2082 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hrzdb\" (UniqueName: \"kubernetes.io/projected/397522db-c941-4fd1-b190-0203500230f0-kube-api-access-hrzdb\") pod \"calico-apiserver-59b7bc967d-ccg8p\" (UID: \"397522db-c941-4fd1-b190-0203500230f0\") " pod="calico-apiserver/calico-apiserver-59b7bc967d-ccg8p" Apr 12 18:47:30.389000 audit[4426]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.389000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd4cfe2080 a2=0 a3=7ffd4cfe206c items=0 ppid=2228 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.392000 audit[4426]: NETFILTER_CFG table=nat:117 family=2 entries=44 op=nft_register_rule pid=4426 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.392000 audit[4426]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd4cfe2080 a2=0 a3=7ffd4cfe206c items=0 ppid=2228 pid=4426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.424000 audit[4428]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.424000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd6375c220 a2=0 a3=7ffd6375c20c items=0 ppid=2228 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.427000 audit[4428]: NETFILTER_CFG table=nat:119 family=2 entries=44 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:30.427000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd6375c220 a2=0 a3=7ffd6375c20c items=0 ppid=2228 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:30.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:30.474501 kubelet[2082]: E0412 18:47:30.474453 2082 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:47:30.474715 kubelet[2082]: E0412 18:47:30.474563 2082 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/397522db-c941-4fd1-b190-0203500230f0-calico-apiserver-certs podName:397522db-c941-4fd1-b190-0203500230f0 nodeName:}" failed. No retries permitted until 2024-04-12 18:47:30.974537016 +0000 UTC m=+113.860395860 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/397522db-c941-4fd1-b190-0203500230f0-calico-apiserver-certs") pod "calico-apiserver-59b7bc967d-ccg8p" (UID: "397522db-c941-4fd1-b190-0203500230f0") : secret "calico-apiserver-certs" not found Apr 12 18:47:31.247092 env[1143]: time="2024-04-12T18:47:31.246989749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59b7bc967d-ccg8p,Uid:397522db-c941-4fd1-b190-0203500230f0,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:47:31.582793 systemd-networkd[1025]: cali13f6c1a8c14: Link UP Apr 12 18:47:31.605464 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:47:31.605624 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali13f6c1a8c14: link becomes ready Apr 12 18:47:31.607110 systemd-networkd[1025]: cali13f6c1a8c14: Gained carrier Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.408 [INFO][4431] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0 calico-apiserver-59b7bc967d- calico-apiserver 397522db-c941-4fd1-b190-0203500230f0 1135 0 2024-04-12 18:47:30 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:59b7bc967d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal calico-apiserver-59b7bc967d-ccg8p eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali13f6c1a8c14 [] []}} ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.408 [INFO][4431] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.477 [INFO][4442] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" HandleID="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.495 [INFO][4442] ipam_plugin.go 268: Auto assigning IP ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" HandleID="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ec8b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", "pod":"calico-apiserver-59b7bc967d-ccg8p", "timestamp":"2024-04-12 18:47:31.47699854 +0000 UTC"}, Hostname:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.496 [INFO][4442] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.496 [INFO][4442] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.496 [INFO][4442] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal' Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.499 [INFO][4442] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.504 [INFO][4442] ipam.go 372: Looking up existing affinities for host host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.511 [INFO][4442] ipam.go 489: Trying affinity for 192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.522 [INFO][4442] ipam.go 155: Attempting to load block cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.532 [INFO][4442] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.0/26 host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.532 [INFO][4442] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.0/26 handle="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.545 [INFO][4442] ipam.go 1682: Creating new handle: k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.563 [INFO][4442] ipam.go 1203: Writing block in order to claim IPs block=192.168.27.0/26 handle="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.574 [INFO][4442] ipam.go 1216: Successfully claimed IPs: [192.168.27.5/26] block=192.168.27.0/26 handle="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.574 [INFO][4442] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.5/26] handle="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" host="ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal" Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.575 [INFO][4442] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:31.626337 env[1143]: 2024-04-12 18:47:31.575 [INFO][4442] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.27.5/26] IPv6=[] ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" HandleID="k8s-pod-network.2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.627671 env[1143]: 2024-04-12 18:47:31.577 [INFO][4431] k8s.go 385: Populated endpoint ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0", GenerateName:"calico-apiserver-59b7bc967d-", Namespace:"calico-apiserver", SelfLink:"", UID:"397522db-c941-4fd1-b190-0203500230f0", ResourceVersion:"1135", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59b7bc967d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"", Pod:"calico-apiserver-59b7bc967d-ccg8p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali13f6c1a8c14", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:31.627671 env[1143]: 2024-04-12 18:47:31.577 [INFO][4431] k8s.go 386: Calico CNI using IPs: [192.168.27.5/32] ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.627671 env[1143]: 2024-04-12 18:47:31.577 [INFO][4431] dataplane_linux.go 68: Setting the host side veth name to cali13f6c1a8c14 ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.627671 env[1143]: 2024-04-12 18:47:31.608 [INFO][4431] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.627671 env[1143]: 2024-04-12 18:47:31.608 [INFO][4431] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0", GenerateName:"calico-apiserver-59b7bc967d-", Namespace:"calico-apiserver", SelfLink:"", UID:"397522db-c941-4fd1-b190-0203500230f0", ResourceVersion:"1135", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 47, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"59b7bc967d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f", Pod:"calico-apiserver-59b7bc967d-ccg8p", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali13f6c1a8c14", MAC:"be:82:fe:66:8d:24", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:31.627671 env[1143]: 2024-04-12 18:47:31.622 [INFO][4431] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f" Namespace="calico-apiserver" Pod="calico-apiserver-59b7bc967d-ccg8p" WorkloadEndpoint="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-calico--apiserver--59b7bc967d--ccg8p-eth0" Apr 12 18:47:31.656994 env[1143]: time="2024-04-12T18:47:31.656843525Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:47:31.656994 env[1143]: time="2024-04-12T18:47:31.656904522Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:47:31.656994 env[1143]: time="2024-04-12T18:47:31.656929794Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:47:31.657795 env[1143]: time="2024-04-12T18:47:31.657732727Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f pid=4469 runtime=io.containerd.runc.v2 Apr 12 18:47:31.692018 systemd[1]: Started cri-containerd-2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f.scope. Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.720000 audit: BPF prog-id=189 op=LOAD Apr 12 18:47:31.721000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.721000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4469 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393365333865306565386130643238393861633331383636316136 Apr 12 18:47:31.722000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.722000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4469 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393365333865306565386130643238393861633331383636316136 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.723000 audit: BPF prog-id=190 op=LOAD Apr 12 18:47:31.723000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028e170 items=0 ppid=4469 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393365333865306565386130643238393861633331383636316136 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.724000 audit: BPF prog-id=191 op=LOAD Apr 12 18:47:31.724000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028e1b8 items=0 ppid=4469 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393365333865306565386130643238393861633331383636316136 Apr 12 18:47:31.725000 audit: BPF prog-id=191 op=UNLOAD Apr 12 18:47:31.725000 audit: BPF prog-id=190 op=UNLOAD Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { perfmon } for pid=4477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit[4477]: AVC avc: denied { bpf } for pid=4477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:31.725000 audit: BPF prog-id=192 op=LOAD Apr 12 18:47:31.725000 audit[4477]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028e5c8 items=0 ppid=4469 pid=4477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233393365333865306565386130643238393861633331383636316136 Apr 12 18:47:31.790441 env[1143]: time="2024-04-12T18:47:31.790380327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-59b7bc967d-ccg8p,Uid:397522db-c941-4fd1-b190-0203500230f0,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f\"" Apr 12 18:47:31.799082 kubelet[2082]: E0412 18:47:31.798986 2082 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Apr 12 18:47:31.799658 env[1143]: time="2024-04-12T18:47:31.799401918Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:47:31.804000 audit[4507]: NETFILTER_CFG table=filter:120 family=2 entries=55 op=nft_register_chain pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:47:31.804000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7fffc94cd910 a2=0 a3=7fffc94cd8fc items=0 ppid=3153 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:31.804000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:47:32.711850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount282556426.mount: Deactivated successfully. Apr 12 18:47:32.773280 systemd-networkd[1025]: cali13f6c1a8c14: Gained IPv6LL Apr 12 18:47:32.964000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:32.964000 audit[1965]: AVC avc: denied { watch } for pid=1965 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:32.964000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cabd60 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:47:32.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:47:32.964000 audit[1965]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001d1aa80 a2=fc6 a3=0 items=0 ppid=1811 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c578,c721 key=(null) Apr 12 18:47:32.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:47:33.610000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:33.610000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c012e48000 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:47:33.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:47:33.611000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:33.611000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0139654d0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:47:33.611000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:47:33.611000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:33.611000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c013965560 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:47:33.611000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:47:33.615000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:33.615000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c01315f050 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:47:33.615000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:47:33.739000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:33.739000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0139656b0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:47:33.739000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:47:33.739000 audit[1951]: AVC avc: denied { watch } for pid=1951 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:47:33.739000 audit[1951]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c012e481c0 a2=fc6 a3=0 items=0 ppid=1774 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c752,c906 key=(null) Apr 12 18:47:33.739000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:47:34.137982 env[1143]: time="2024-04-12T18:47:34.137902952Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.141633 env[1143]: time="2024-04-12T18:47:34.141547726Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.145046 env[1143]: time="2024-04-12T18:47:34.144974439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.148860 env[1143]: time="2024-04-12T18:47:34.148810681Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:47:34.150388 env[1143]: time="2024-04-12T18:47:34.149703295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:47:34.155661 env[1143]: time="2024-04-12T18:47:34.155610920Z" level=info msg="CreateContainer within sandbox \"2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:47:34.179678 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3543930207.mount: Deactivated successfully. Apr 12 18:47:34.186181 env[1143]: time="2024-04-12T18:47:34.186110627Z" level=info msg="CreateContainer within sandbox \"2393e38e0ee8a0d2898ac318661a6fb45fbaaa99712a965be6cfeae8440ffb5f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0f62fc0c6ce5fc5ef0af284b785fb4b9664caad651d362690f8308ad1a0f3d52\"" Apr 12 18:47:34.188912 env[1143]: time="2024-04-12T18:47:34.188507967Z" level=info msg="StartContainer for \"0f62fc0c6ce5fc5ef0af284b785fb4b9664caad651d362690f8308ad1a0f3d52\"" Apr 12 18:47:34.232209 systemd[1]: Started cri-containerd-0f62fc0c6ce5fc5ef0af284b785fb4b9664caad651d362690f8308ad1a0f3d52.scope. Apr 12 18:47:34.260643 kernel: kauditd_printk_skb: 97 callbacks suppressed Apr 12 18:47:34.260838 kernel: audit: type=1400 audit(1712947654.253:1547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.303228 kernel: audit: type=1400 audit(1712947654.253:1548): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.324488 kernel: audit: type=1400 audit(1712947654.253:1549): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.369470 kernel: audit: type=1400 audit(1712947654.253:1550): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.369735 kernel: audit: type=1400 audit(1712947654.253:1551): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.394365 kernel: audit: type=1400 audit(1712947654.253:1552): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.417440 kernel: audit: type=1400 audit(1712947654.253:1553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.459549 kernel: audit: type=1400 audit(1712947654.253:1554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.459725 kernel: audit: type=1400 audit(1712947654.253:1555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.481335 kernel: audit: type=1400 audit(1712947654.280:1556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.280000 audit: BPF prog-id=193 op=LOAD Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4469 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066363266633063366365356663356566306166323834623738356662 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4469 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066363266633063366365356663356566306166323834623738356662 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.281000 audit: BPF prog-id=194 op=LOAD Apr 12 18:47:34.281000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025020 items=0 ppid=4469 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066363266633063366365356663356566306166323834623738356662 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.301000 audit: BPF prog-id=195 op=LOAD Apr 12 18:47:34.301000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025068 items=0 ppid=4469 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066363266633063366365356663356566306166323834623738356662 Apr 12 18:47:34.301000 audit: BPF prog-id=195 op=UNLOAD Apr 12 18:47:34.301000 audit: BPF prog-id=194 op=UNLOAD Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { perfmon } for pid=4516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit[4516]: AVC avc: denied { bpf } for pid=4516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:47:34.302000 audit: BPF prog-id=196 op=LOAD Apr 12 18:47:34.302000 audit[4516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025478 items=0 ppid=4469 pid=4516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066363266633063366365356663356566306166323834623738356662 Apr 12 18:47:34.485509 env[1143]: time="2024-04-12T18:47:34.485289534Z" level=info msg="StartContainer for \"0f62fc0c6ce5fc5ef0af284b785fb4b9664caad651d362690f8308ad1a0f3d52\" returns successfully" Apr 12 18:47:34.880704 kubelet[2082]: I0412 18:47:34.880663 2082 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-59b7bc967d-ccg8p" podStartSLOduration=2.52313739 podCreationTimestamp="2024-04-12 18:47:30 +0000 UTC" firstStartedPulling="2024-04-12 18:47:31.792692985 +0000 UTC m=+114.678551844" lastFinishedPulling="2024-04-12 18:47:34.150141303 +0000 UTC m=+117.036000158" observedRunningTime="2024-04-12 18:47:34.878003538 +0000 UTC m=+117.763862407" watchObservedRunningTime="2024-04-12 18:47:34.880585704 +0000 UTC m=+117.766444576" Apr 12 18:47:34.935000 audit[4546]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:34.935000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc02558800 a2=0 a3=7ffc025587ec items=0 ppid=2228 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.935000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:34.939000 audit[4546]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4546 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:34.939000 audit[4546]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc02558800 a2=0 a3=7ffc025587ec items=0 ppid=2228 pid=4546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:34.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:34.955361 systemd[1]: Started sshd@23-10.128.0.9:22-139.178.89.65:53914.service. Apr 12 18:47:34.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.9:22-139.178.89.65:53914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:35.302000 audit[4548]: USER_ACCT pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:35.305648 sshd[4548]: Accepted publickey for core from 139.178.89.65 port 53914 ssh2: RSA SHA256:XKFMBFadJXSMDH/AGu0Wp1o8GIJqXXW9iA48JbQvGEs Apr 12 18:47:35.304000 audit[4548]: CRED_ACQ pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:35.304000 audit[4548]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8741f1c0 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:35.304000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:47:35.306798 sshd[4548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:47:35.315455 systemd[1]: Started session-23.scope. Apr 12 18:47:35.316793 systemd-logind[1132]: New session 23 of user core. Apr 12 18:47:35.331000 audit[4548]: USER_START pid=4548 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:35.334000 audit[4550]: CRED_ACQ pid=4550 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:35.368000 audit[4552]: NETFILTER_CFG table=filter:123 family=2 entries=10 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:35.368000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffecece5280 a2=0 a3=7ffecece526c items=0 ppid=2228 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:35.368000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:35.372000 audit[4552]: NETFILTER_CFG table=nat:124 family=2 entries=44 op=nft_register_rule pid=4552 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:47:35.372000 audit[4552]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffecece5280 a2=0 a3=7ffecece526c items=0 ppid=2228 pid=4552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:47:35.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:47:35.693459 sshd[4548]: pam_unix(sshd:session): session closed for user core Apr 12 18:47:35.694000 audit[4548]: USER_END pid=4548 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:35.695000 audit[4548]: CRED_DISP pid=4548 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Apr 12 18:47:35.699452 systemd-logind[1132]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:47:35.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.9:22-139.178.89.65:53914 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:47:35.700217 systemd[1]: sshd@23-10.128.0.9:22-139.178.89.65:53914.service: Deactivated successfully. Apr 12 18:47:35.701457 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:47:35.703767 systemd-logind[1132]: Removed session 23. Apr 12 18:47:36.771000 audit[4526]: AVC avc: denied { watch } for pid=4526 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_47_30.551278407/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c28,c759 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c28,c759 tclass=file permissive=0 Apr 12 18:47:36.771000 audit[4526]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006567a0 a2=fc6 a3=0 items=0 ppid=4469 pid=4526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c28,c759 key=(null) Apr 12 18:47:36.771000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:47:37.999216 env[1143]: time="2024-04-12T18:47:37.999131589Z" level=info msg="StopPodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\"" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.053 [WARNING][4582] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6", Pod:"coredns-5dd5756b68-sr9n7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid244f592374", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.054 [INFO][4582] k8s.go 585: Cleaning up netns ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.054 [INFO][4582] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" iface="eth0" netns="" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.054 [INFO][4582] k8s.go 592: Releasing IP address(es) ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.054 [INFO][4582] utils.go 188: Calico CNI releasing IP address ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.086 [INFO][4589] ipam_plugin.go 415: Releasing address using handleID ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.087 [INFO][4589] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.087 [INFO][4589] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.094 [WARNING][4589] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.094 [INFO][4589] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.096 [INFO][4589] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:38.098773 env[1143]: 2024-04-12 18:47:38.097 [INFO][4582] k8s.go 598: Teardown processing complete. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.099540 env[1143]: time="2024-04-12T18:47:38.099483574Z" level=info msg="TearDown network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" successfully" Apr 12 18:47:38.099658 env[1143]: time="2024-04-12T18:47:38.099624441Z" level=info msg="StopPodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" returns successfully" Apr 12 18:47:38.100364 env[1143]: time="2024-04-12T18:47:38.100324578Z" level=info msg="RemovePodSandbox for \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\"" Apr 12 18:47:38.100547 env[1143]: time="2024-04-12T18:47:38.100371716Z" level=info msg="Forcibly stopping sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\"" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.148 [WARNING][4608] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"9e21d4fe-eb70-45c2-9f60-11ba5c0644fd", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"20a67101efa3f668a2d613cecace3620981c03fe4cd362be96ff2242400a5dd6", Pod:"coredns-5dd5756b68-sr9n7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid244f592374", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.149 [INFO][4608] k8s.go 585: Cleaning up netns ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.149 [INFO][4608] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" iface="eth0" netns="" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.149 [INFO][4608] k8s.go 592: Releasing IP address(es) ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.149 [INFO][4608] utils.go 188: Calico CNI releasing IP address ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.180 [INFO][4615] ipam_plugin.go 415: Releasing address using handleID ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.181 [INFO][4615] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.181 [INFO][4615] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.188 [WARNING][4615] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.188 [INFO][4615] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" HandleID="k8s-pod-network.6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--sr9n7-eth0" Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.190 [INFO][4615] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:38.192648 env[1143]: 2024-04-12 18:47:38.191 [INFO][4608] k8s.go 598: Teardown processing complete. ContainerID="6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84" Apr 12 18:47:38.193551 env[1143]: time="2024-04-12T18:47:38.192687567Z" level=info msg="TearDown network for sandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" successfully" Apr 12 18:47:38.201050 env[1143]: time="2024-04-12T18:47:38.200986302Z" level=info msg="RemovePodSandbox \"6b604db2859159290942df42b5befb80ae8b5926abff3ec59233b980fc527d84\" returns successfully" Apr 12 18:47:38.201700 env[1143]: time="2024-04-12T18:47:38.201640538Z" level=info msg="StopPodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\"" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.256 [WARNING][4633] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"488a70c9-339f-499d-bbfb-0fcd4ff1daea", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5", Pod:"coredns-5dd5756b68-94tl7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali29a28f6db2f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.256 [INFO][4633] k8s.go 585: Cleaning up netns ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.256 [INFO][4633] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" iface="eth0" netns="" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.257 [INFO][4633] k8s.go 592: Releasing IP address(es) ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.257 [INFO][4633] utils.go 188: Calico CNI releasing IP address ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.282 [INFO][4639] ipam_plugin.go 415: Releasing address using handleID ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.283 [INFO][4639] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.283 [INFO][4639] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.290 [WARNING][4639] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.290 [INFO][4639] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.293 [INFO][4639] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:38.295886 env[1143]: 2024-04-12 18:47:38.294 [INFO][4633] k8s.go 598: Teardown processing complete. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.298185 env[1143]: time="2024-04-12T18:47:38.295830880Z" level=info msg="TearDown network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" successfully" Apr 12 18:47:38.298317 env[1143]: time="2024-04-12T18:47:38.298193680Z" level=info msg="StopPodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" returns successfully" Apr 12 18:47:38.299007 env[1143]: time="2024-04-12T18:47:38.298968569Z" level=info msg="RemovePodSandbox for \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\"" Apr 12 18:47:38.299140 env[1143]: time="2024-04-12T18:47:38.299016602Z" level=info msg="Forcibly stopping sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\"" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.344 [WARNING][4657] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"488a70c9-339f-499d-bbfb-0fcd4ff1daea", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-3-d40a5ede83d14543857b.c.flatcar-212911.internal", ContainerID:"38fa295d3cf4ebe579aea83876d020d0fb80ad601dc54775fed4b444c92e53a5", Pod:"coredns-5dd5756b68-94tl7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali29a28f6db2f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.345 [INFO][4657] k8s.go 585: Cleaning up netns ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.345 [INFO][4657] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" iface="eth0" netns="" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.345 [INFO][4657] k8s.go 592: Releasing IP address(es) ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.345 [INFO][4657] utils.go 188: Calico CNI releasing IP address ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.375 [INFO][4665] ipam_plugin.go 415: Releasing address using handleID ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.375 [INFO][4665] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.375 [INFO][4665] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.384 [WARNING][4665] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.385 [INFO][4665] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" HandleID="k8s-pod-network.5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Workload="ci--3510--3--3--d40a5ede83d14543857b.c.flatcar--212911.internal-k8s-coredns--5dd5756b68--94tl7-eth0" Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.386 [INFO][4665] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:47:38.389280 env[1143]: 2024-04-12 18:47:38.388 [INFO][4657] k8s.go 598: Teardown processing complete. ContainerID="5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b" Apr 12 18:47:38.391125 env[1143]: time="2024-04-12T18:47:38.389337413Z" level=info msg="TearDown network for sandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" successfully" Apr 12 18:47:38.394892 env[1143]: time="2024-04-12T18:47:38.394844039Z" level=info msg="RemovePodSandbox \"5fed19b803d342273d54d548c3af6cd9a87becdbc1ef13ea841d94d93f2f019b\" returns successfully"